Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 844 | labels stringlengths 4 721 | body stringlengths 1 261k | index stringclasses 12 values | text_combine stringlengths 96 261k | label stringclasses 2 values | text stringlengths 96 248k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
19,997 | 10,441,348,511 | IssuesEvent | 2019-09-18 10:37:13 | pcrane70/ksa | https://api.github.com/repos/pcrane70/ksa | opened | CVE-2016-10539 (High) detected in negotiator-0.3.0.tgz | security vulnerability | ## CVE-2016-10539 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>negotiator-0.3.0.tgz</b></p></summary>
<p>HTTP content negotiation</p>
<p>Library home page: <a href="https://registry.npmjs.org/negotiator/-/negotiator-0.3.0.tgz">https://registry.npmjs.org/negotiator/-/negotiator-0.3.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/node_modules/negotiator/package.json</p>
<p>
Dependency Hierarchy:
- connect-2.14.0.tgz (Root Library)
- compression-1.0.0.tgz
- :x: **negotiator-0.3.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/pcrane70/ksa/commit/59e284a4a972548ef0fd442371ef09356994f909">59e284a4a972548ef0fd442371ef09356994f909</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa. The header for "Accept-Language", when parsed by negotiator 0.6.0 and earlier is vulnerable to Regular Expression Denial of Service via a specially crafted string.
<p>Publish Date: 2018-05-31
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10539>CVE-2016-10539</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/106">https://nodesecurity.io/advisories/106</a></p>
<p>Release Date: 2016-06-16</p>
<p>Fix Resolution: Upgrade to at least version 0.6.1
Express users should update to Express 4.14.0 or greater. If you want to see if you are using a vulnerable call, a quick grep for the `acceptsLanguages` function call in your application will tell you if you are using this functionality.</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"negotiator","packageVersion":"0.3.0","isTransitiveDependency":true,"dependencyTree":"connect:2.14.0;compression:1.0.0;negotiator:0.3.0","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2016-10539","vulnerabilityDetails":"negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa. The header for \"Accept-Language\", when parsed by negotiator 0.6.0 and earlier is vulnerable to Regular Expression Denial of Service via a specially crafted string.","vulnerabilityUrl":"https://cve.mitre.org/cgi-bin/cvename.cgi?name\u003dCVE-2016-10539","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2016-10539 (High) detected in negotiator-0.3.0.tgz - ## CVE-2016-10539 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>negotiator-0.3.0.tgz</b></p></summary>
<p>HTTP content negotiation</p>
<p>Library home page: <a href="https://registry.npmjs.org/negotiator/-/negotiator-0.3.0.tgz">https://registry.npmjs.org/negotiator/-/negotiator-0.3.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/node_modules/negotiator/package.json</p>
<p>
Dependency Hierarchy:
- connect-2.14.0.tgz (Root Library)
- compression-1.0.0.tgz
- :x: **negotiator-0.3.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/pcrane70/ksa/commit/59e284a4a972548ef0fd442371ef09356994f909">59e284a4a972548ef0fd442371ef09356994f909</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa. The header for "Accept-Language", when parsed by negotiator 0.6.0 and earlier is vulnerable to Regular Expression Denial of Service via a specially crafted string.
<p>Publish Date: 2018-05-31
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10539>CVE-2016-10539</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/106">https://nodesecurity.io/advisories/106</a></p>
<p>Release Date: 2016-06-16</p>
<p>Fix Resolution: Upgrade to at least version 0.6.1
Express users should update to Express 4.14.0 or greater. If you want to see if you are using a vulnerable call, a quick grep for the `acceptsLanguages` function call in your application will tell you if you are using this functionality.</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"negotiator","packageVersion":"0.3.0","isTransitiveDependency":true,"dependencyTree":"connect:2.14.0;compression:1.0.0;negotiator:0.3.0","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2016-10539","vulnerabilityDetails":"negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa. The header for \"Accept-Language\", when parsed by negotiator 0.6.0 and earlier is vulnerable to Regular Expression Denial of Service via a specially crafted string.","vulnerabilityUrl":"https://cve.mitre.org/cgi-bin/cvename.cgi?name\u003dCVE-2016-10539","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in negotiator tgz cve high severity vulnerability vulnerable library negotiator tgz http content negotiation library home page a href path to dependency file tmp ws scm ksa ksa web root ksa web src main webapp rs bootstrap package json path to vulnerable library tmp ws scm ksa ksa web root ksa web src main webapp rs bootstrap node modules negotiator package json dependency hierarchy connect tgz root library compression tgz x negotiator tgz vulnerable library found in head commit a href vulnerability details negotiator is an http content negotiator for node js and is used by many modules and frameworks including express and koa the header for accept language when parsed by negotiator and earlier is vulnerable to regular expression denial of service via a specially crafted string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution upgrade to at least version express users should update to express or greater if you want to see if you are using a vulnerable call a quick grep for the acceptslanguages function call in your application will tell you if you are using this functionality isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails negotiator is an http content negotiator for node js and is used by many modules and frameworks including express and koa the header for accept language when parsed by negotiator and earlier is vulnerable to regular expression denial of service via a specially crafted string vulnerabilityurl | 0 |
162,837 | 13,902,723,891 | IssuesEvent | 2020-10-20 05:57:47 | appsmithorg/appsmith | https://api.github.com/repos/appsmithorg/appsmith | closed | [Docs] Images are not optimized | Documentation | ## Documentation Link
N/A
## Describe the problem
Images in this repository are not optimized.
## Describe the improvement
I have losslessly compressed them and was able to reduce the overall file size by around 22% without losing any image quality. My branch can be found [here](https://github.com/JeffResc/appsmith/tree/img). I would like to create a pull request with these changes, but I am opening an issue first to seek input.
| 1.0 | [Docs] Images are not optimized - ## Documentation Link
N/A
## Describe the problem
Images in this repository are not optimized.
## Describe the improvement
I have losslessly compressed them and was able to reduce the overall file size by around 22% without losing any image quality. My branch can be found [here](https://github.com/JeffResc/appsmith/tree/img). I would like to create a pull request with these changes, but I am opening an issue first to seek input.
| non_priority | images are not optimized documentation link n a describe the problem images in this repository are not optimized describe the improvement i have losslessly compressed them and was able to reduce the overall file size by around without losing any image quality my branch can be found i would like to create a pull request with these changes but i am opening an issue first to seek input | 0 |
240,445 | 26,256,342,616 | IssuesEvent | 2023-01-06 01:18:21 | manishshanker/react-redux-d3-webpack-es6-seed | https://api.github.com/repos/manishshanker/react-redux-d3-webpack-es6-seed | opened | WS-2020-0345 (High) detected in jsonpointer-4.0.1.tgz | security vulnerability | ## WS-2020-0345 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonpointer-4.0.1.tgz</b></p></summary>
<p>Simple JSON Addressing.</p>
<p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz</a></p>
<p>Path to dependency file: /react-redux-d3-webpack-es6-seed/package.json</p>
<p>Path to vulnerable library: /node_modules/jsonpointer/package.json</p>
<p>
Dependency Hierarchy:
- eslint-2.8.0.tgz (Root Library)
- is-my-json-valid-2.20.0.tgz
- :x: **jsonpointer-4.0.1.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function.
<p>Publish Date: 2020-07-03
<p>URL: <a href=https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34>WS-2020-0345</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-07-03</p>
<p>Fix Resolution (jsonpointer): 4.1.0</p>
<p>Direct dependency fix Resolution (eslint): 2.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2020-0345 (High) detected in jsonpointer-4.0.1.tgz - ## WS-2020-0345 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonpointer-4.0.1.tgz</b></p></summary>
<p>Simple JSON Addressing.</p>
<p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz</a></p>
<p>Path to dependency file: /react-redux-d3-webpack-es6-seed/package.json</p>
<p>Path to vulnerable library: /node_modules/jsonpointer/package.json</p>
<p>
Dependency Hierarchy:
- eslint-2.8.0.tgz (Root Library)
- is-my-json-valid-2.20.0.tgz
- :x: **jsonpointer-4.0.1.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function.
<p>Publish Date: 2020-07-03
<p>URL: <a href=https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34>WS-2020-0345</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-07-03</p>
<p>Fix Resolution (jsonpointer): 4.1.0</p>
<p>Direct dependency fix Resolution (eslint): 2.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws high detected in jsonpointer tgz ws high severity vulnerability vulnerable library jsonpointer tgz simple json addressing library home page a href path to dependency file react redux webpack seed package json path to vulnerable library node modules jsonpointer package json dependency hierarchy eslint tgz root library is my json valid tgz x jsonpointer tgz vulnerable library vulnerability details prototype pollution vulnerability was found in jsonpointer before via the set function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution jsonpointer direct dependency fix resolution eslint step up your open source security game with mend | 0 |
156,917 | 13,656,318,466 | IssuesEvent | 2020-09-28 02:19:33 | Requisitos-de-Software/2020.1-GuardioesdaSaude | https://api.github.com/repos/Requisitos-de-Software/2020.1-GuardioesdaSaude | closed | Criação do Storytelling | documentation | ### Fazer o documento de Storytelling
Fazer o documento Storytelling do app analisado
Nessa issue será realizado:
- O documento Storytelling do app analisado;
- Colocar o documento no gh pages.
Critérios de aceitação:
- [ ] Storytelling criada
| 1.0 | Criação do Storytelling - ### Fazer o documento de Storytelling
Fazer o documento Storytelling do app analisado
Nessa issue será realizado:
- O documento Storytelling do app analisado;
- Colocar o documento no gh pages.
Critérios de aceitação:
- [ ] Storytelling criada
| non_priority | criação do storytelling fazer o documento de storytelling fazer o documento storytelling do app analisado nessa issue será realizado o documento storytelling do app analisado colocar o documento no gh pages critérios de aceitação storytelling criada | 0 |
313,243 | 23,464,649,324 | IssuesEvent | 2022-08-16 15:41:46 | golang/go | https://api.github.com/repos/golang/go | closed | go install OR docs inconsistent to install multiple versions | Documentation | ### What version of Go are you using (`go version`)?
<pre>
$ go version
go version go1.15.15 linux/amd64
</pre>
### Does this issue reproduce with the latest release?
Yes.
### What operating system and processor architecture are you using (`go env`)?
<details><summary><code>go env</code> Output</summary><br><pre>
$ go env
GO111MODULE=""
GOARCH="amd64"
GOBIN=""
GOCACHE="/home/user/.cache/go-build"
GOENV="/home/user/.config/go/env"
GOEXE=""
GOFLAGS=""
GOHOSTARCH="amd64"
GOHOSTOS="linux"
GOINSECURE=""
GOMODCACHE="/home/user/go/pkg/mod"
GONOPROXY=""
GONOSUMDB=""
GOOS="linux"
GOPATH="/home/user/go"
GOPRIVATE=""
GOPROXY="https://proxy.golang.org,direct"
GOROOT="/opt/go/1.18"
GOSUMDB="sum.golang.org"
GOTMPDIR=""
GOTOOLDIR="/opt/go/1.18/pkg/tool/linux_amd64"
GCCGO="gccgo"
AR="ar"
CC="gcc"
CXX="g++"
CGO_ENABLED="1"
GOMOD=""
CGO_CFLAGS="-g -O2"
CGO_CPPFLAGS=""
CGO_CXXFLAGS="-g -O2"
CGO_FFLAGS="-g -O2"
CGO_LDFLAGS="-g -O2"
PKG_CONFIG="pkg-config"
GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build482777503=/tmp/go-build -gno-record-gcc-switches"
</pre></details>
### What did you do?
1. cd to a go module.
2. execute install as instructed in https://go.dev/doc/manage-install
```sh
$ go install golang.org/dl/go1.17.0@latest
```
### What did you expect to see?
```
$ go1.17.0 version
> return a value
```
### What did you see instead?
```
> go install golang.org/dl/go1.17.0@latest
> package golang.org/dl/go1.17.0@latest: can only use path@version syntax with 'go get'
$ go1.17.0 version
>
```
| 1.0 | go install OR docs inconsistent to install multiple versions - ### What version of Go are you using (`go version`)?
<pre>
$ go version
go version go1.15.15 linux/amd64
</pre>
### Does this issue reproduce with the latest release?
Yes.
### What operating system and processor architecture are you using (`go env`)?
<details><summary><code>go env</code> Output</summary><br><pre>
$ go env
GO111MODULE=""
GOARCH="amd64"
GOBIN=""
GOCACHE="/home/user/.cache/go-build"
GOENV="/home/user/.config/go/env"
GOEXE=""
GOFLAGS=""
GOHOSTARCH="amd64"
GOHOSTOS="linux"
GOINSECURE=""
GOMODCACHE="/home/user/go/pkg/mod"
GONOPROXY=""
GONOSUMDB=""
GOOS="linux"
GOPATH="/home/user/go"
GOPRIVATE=""
GOPROXY="https://proxy.golang.org,direct"
GOROOT="/opt/go/1.18"
GOSUMDB="sum.golang.org"
GOTMPDIR=""
GOTOOLDIR="/opt/go/1.18/pkg/tool/linux_amd64"
GCCGO="gccgo"
AR="ar"
CC="gcc"
CXX="g++"
CGO_ENABLED="1"
GOMOD=""
CGO_CFLAGS="-g -O2"
CGO_CPPFLAGS=""
CGO_CXXFLAGS="-g -O2"
CGO_FFLAGS="-g -O2"
CGO_LDFLAGS="-g -O2"
PKG_CONFIG="pkg-config"
GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build482777503=/tmp/go-build -gno-record-gcc-switches"
</pre></details>
### What did you do?
1. cd to a go module.
2. execute install as instructed in https://go.dev/doc/manage-install
```sh
$ go install golang.org/dl/go1.17.0@latest
```
### What did you expect to see?
```
$ go1.17.0 version
> return a value
```
### What did you see instead?
```
> go install golang.org/dl/go1.17.0@latest
> package golang.org/dl/go1.17.0@latest: can only use path@version syntax with 'go get'
$ go1.17.0 version
>
```
| non_priority | go install or docs inconsistent to install multiple versions what version of go are you using go version go version go version linux does this issue reproduce with the latest release yes what operating system and processor architecture are you using go env go env output go env goarch gobin gocache home user cache go build goenv home user config go env goexe goflags gohostarch gohostos linux goinsecure gomodcache home user go pkg mod gonoproxy gonosumdb goos linux gopath home user go goprivate goproxy goroot opt go gosumdb sum golang org gotmpdir gotooldir opt go pkg tool linux gccgo gccgo ar ar cc gcc cxx g cgo enabled gomod cgo cflags g cgo cppflags cgo cxxflags g cgo fflags g cgo ldflags g pkg config pkg config gogccflags fpic pthread fmessage length fdebug prefix map tmp go tmp go build gno record gcc switches what did you do cd to a go module execute install as instructed in sh go install golang org dl latest what did you expect to see version return a value what did you see instead go install golang org dl latest package golang org dl latest can only use path version syntax with go get version | 0 |
32,981 | 15,733,157,020 | IssuesEvent | 2021-03-29 19:12:19 | rooklift/nibbler | https://api.github.com/repos/rooklift/nibbler | closed | PGN handling is too slow | performance | New strategy needed:
- Just load the whole thing into buffer. Use that instead of pgn_choices.
- Don't pre-parse anything in the PGN until actually necessary.
- Can probably use the sync versions of the splitter and the pre-parser again.
Major difficulty is the newgame detection. Probably searching for both `\n\n[` and `\r\n\r\n[` is good enough? | True | PGN handling is too slow - New strategy needed:
- Just load the whole thing into buffer. Use that instead of pgn_choices.
- Don't pre-parse anything in the PGN until actually necessary.
- Can probably use the sync versions of the splitter and the pre-parser again.
Major difficulty is the newgame detection. Probably searching for both `\n\n[` and `\r\n\r\n[` is good enough? | non_priority | pgn handling is too slow new strategy needed just load the whole thing into buffer use that instead of pgn choices don t pre parse anything in the pgn until actually necessary can probably use the sync versions of the splitter and the pre parser again major difficulty is the newgame detection probably searching for both n n and r n r n is good enough | 0 |
389,039 | 26,795,112,503 | IssuesEvent | 2023-02-01 11:17:05 | kg-construct/fnml-spec | https://api.github.com/repos/kg-construct/fnml-spec | closed | Visual overview of connections FNML | documentation | I think we need to generalize the _Figure 1 Visual overview of connections FNML_ to also cover the reference to functions as subject and probably predicate, right? | 1.0 | Visual overview of connections FNML - I think we need to generalize the _Figure 1 Visual overview of connections FNML_ to also cover the reference to functions as subject and probably predicate, right? | non_priority | visual overview of connections fnml i think we need to generalize the figure visual overview of connections fnml to also cover the reference to functions as subject and probably predicate right | 0 |
68,903 | 9,220,226,716 | IssuesEvent | 2019-03-11 17:01:41 | react-native-google-cast/react-native-google-cast | https://api.github.com/repos/react-native-google-cast/react-native-google-cast | closed | How to integrate this library without using Cocoapods? | documentation | I'm trying to integrate this library but not using Cocoapods, but not working so far
Things I tried:
npm install react-native-google-cast --save
react-native link react-native-google-cast
then following this to download SDK, and added the framework to xcode manually
https://developers.google.com/cast/docs/ios_sender_setup
but couldn't make xcode to build
got error: 'GoogleCast/GoogleCast.h' file not found | 1.0 | How to integrate this library without using Cocoapods? - I'm trying to integrate this library but not using Cocoapods, but not working so far
Things I tried:
npm install react-native-google-cast --save
react-native link react-native-google-cast
then following this to download SDK, and added the framework to xcode manually
https://developers.google.com/cast/docs/ios_sender_setup
but couldn't make xcode to build
got error: 'GoogleCast/GoogleCast.h' file not found | non_priority | how to integrate this library without using cocoapods i m trying to integrate this library but not using cocoapods but not working so far things i tried npm install react native google cast save react native link react native google cast then following this to download sdk and added the framework to xcode manually but couldn t make xcode to build got error googlecast googlecast h file not found | 0 |
64,694 | 7,836,211,575 | IssuesEvent | 2018-06-17 16:41:16 | CityOfZion/neon-wallet | https://api.github.com/repos/CityOfZion/neon-wallet | closed | Update fonts according to designs | design-v2 | Fonts used in wallet app doesn't seem to be following fonts used in designs. There should be more details about fonts used in designs and then changes should be applied to the wallet app.
Check designs for reference. | 1.0 | Update fonts according to designs - Fonts used in wallet app doesn't seem to be following fonts used in designs. There should be more details about fonts used in designs and then changes should be applied to the wallet app.
Check designs for reference. | non_priority | update fonts according to designs fonts used in wallet app doesn t seem to be following fonts used in designs there should be more details about fonts used in designs and then changes should be applied to the wallet app check designs for reference | 0 |
14,763 | 11,133,586,894 | IssuesEvent | 2019-12-20 09:44:08 | finos-plexus/plexus-interop | https://api.github.com/repos/finos-plexus/plexus-interop | opened | Fix security vulnerabilities | help wanted infrastructure security | Fix detected security vulnerabilities in plexus-interop repo:
https://github.com/finos-plexus/plexus-interop/network/alerts | 1.0 | Fix security vulnerabilities - Fix detected security vulnerabilities in plexus-interop repo:
https://github.com/finos-plexus/plexus-interop/network/alerts | non_priority | fix security vulnerabilities fix detected security vulnerabilities in plexus interop repo | 0 |
142,804 | 19,103,034,122 | IssuesEvent | 2021-11-30 01:57:55 | TreyM-WSS/Struts2-Examples | https://api.github.com/repos/TreyM-WSS/Struts2-Examples | opened | CVE-2021-39148 (High) detected in xstream-1.4.2.jar | security vulnerability | ## CVE-2021-39148 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.2.jar</b></p></summary>
<p>The Codehaus is a collaborative environment for building open source projects with a strong emphasis on modern languages, focussed on quality components that meet real world needs.</p>
<p>Path to dependency file: Struts2-Examples/Struts2RestConvention/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.2/xstream-1.4.2.jar,Struts2-Examples/Struts2RestConvention/target/Struts2Rest/WEB-INF/lib/xstream-1.4.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **xstream-1.4.2.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
<p>Publish Date: 2021-08-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39148>CVE-2021-39148</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2">https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2</a></p>
<p>Release Date: 2021-08-23</p>
<p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.18</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.2","packageFilePaths":["/Struts2RestConvention/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2021-39148","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39148","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-39148 (High) detected in xstream-1.4.2.jar - ## CVE-2021-39148 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.2.jar</b></p></summary>
<p>The Codehaus is a collaborative environment for building open source projects with a strong emphasis on modern languages, focussed on quality components that meet real world needs.</p>
<p>Path to dependency file: Struts2-Examples/Struts2RestConvention/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.2/xstream-1.4.2.jar,Struts2-Examples/Struts2RestConvention/target/Struts2Rest/WEB-INF/lib/xstream-1.4.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **xstream-1.4.2.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
<p>Publish Date: 2021-08-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39148>CVE-2021-39148</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2">https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2</a></p>
<p>Release Date: 2021-08-23</p>
<p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.18</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.2","packageFilePaths":["/Struts2RestConvention/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2021-39148","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39148","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in xstream jar cve high severity vulnerability vulnerable library xstream jar the codehaus is a collaborative environment for building open source projects with a strong emphasis on modern languages focussed on quality components that meet real world needs path to dependency file examples pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar examples target web inf lib xstream jar dependency hierarchy x xstream jar vulnerable library vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl | 0 |
228,106 | 17,410,562,934 | IssuesEvent | 2021-08-03 11:47:21 | PyTorchLightning/pytorch-lightning | https://api.github.com/repos/PyTorchLightning/pytorch-lightning | closed | [RFC][Docs] Expand Common Use Cases to improve discoverability | documentation enhancement | ## 📚 Documentation
The goal is to improve discoverability when using the docs for new users, or users who just want to see what features we support. We've grouped quite a bit into the drop down which hides and obfuscates important information that the user may not know to click imo.
To improve this, I suggest we go from this:
<img width="1494" alt="Screenshot 2021-08-03 at 11 47 04" src="https://user-images.githubusercontent.com/6707363/128003236-194f5eb6-8a1e-4991-af6f-f5fab6dd64cb.png">
to this:
<img width="1511" alt="Screenshot 2021-08-03 at 11 45 10" src="https://user-images.githubusercontent.com/6707363/128003022-e39ae762-d416-4095-8ba3-70c20d72739a.png">
Negatives are that dropdown options below common use cases require scrolling now, however I think this is fine given the priority of showing features that we support out the box on the left.
| 1.0 | [RFC][Docs] Expand Common Use Cases to improve discoverability - ## 📚 Documentation
The goal is to improve discoverability when using the docs for new users, or users who just want to see what features we support. We've grouped quite a bit into the drop down which hides and obfuscates important information that the user may not know to click imo.
To improve this, I suggest we go from this:
<img width="1494" alt="Screenshot 2021-08-03 at 11 47 04" src="https://user-images.githubusercontent.com/6707363/128003236-194f5eb6-8a1e-4991-af6f-f5fab6dd64cb.png">
to this:
<img width="1511" alt="Screenshot 2021-08-03 at 11 45 10" src="https://user-images.githubusercontent.com/6707363/128003022-e39ae762-d416-4095-8ba3-70c20d72739a.png">
Negatives are that dropdown options below common use cases require scrolling now, however I think this is fine given the priority of showing features that we support out the box on the left.
| non_priority | expand common use cases to improve discoverability 📚 documentation the goal is to improve discoverability when using the docs for new users or users who just want to see what features we support we ve grouped quite a bit into the drop down which hides and obfuscates important information that the user may not know to click imo to improve this i suggest we go from this img width alt screenshot at src to this img width alt screenshot at src negatives are that dropdown options below common use cases require scrolling now however i think this is fine given the priority of showing features that we support out the box on the left | 0 |
35,526 | 9,606,436,330 | IssuesEvent | 2019-05-11 10:21:19 | moby/moby | https://api.github.com/repos/moby/moby | closed | Deprecate the dot | area/builder area/cli kind/enhancement | When building images, let’s assume the Dockerfile and associated resources are found in the current working directory unless this path is explicitly overridden. | 1.0 | Deprecate the dot - When building images, let’s assume the Dockerfile and associated resources are found in the current working directory unless this path is explicitly overridden. | non_priority | deprecate the dot when building images let’s assume the dockerfile and associated resources are found in the current working directory unless this path is explicitly overridden | 0 |
124,294 | 12,228,206,945 | IssuesEvent | 2020-05-03 18:24:42 | Kkwolek98/psm-project | https://api.github.com/repos/Kkwolek98/psm-project | closed | Uzupełnienie albumu na imgur o nowe zmiany | documentation | Zmiany:
Profile ---> dodano listę znajomych
FindItem ---> losowy cytat motywacyjny
Login ---> dodano funkcję log in with google | 1.0 | Uzupełnienie albumu na imgur o nowe zmiany - Zmiany:
Profile ---> dodano listę znajomych
FindItem ---> losowy cytat motywacyjny
Login ---> dodano funkcję log in with google | non_priority | uzupełnienie albumu na imgur o nowe zmiany zmiany profile dodano listę znajomych finditem losowy cytat motywacyjny login dodano funkcję log in with google | 0 |
55,781 | 31,027,048,785 | IssuesEvent | 2023-08-10 09:50:17 | kodadot/nft-gallery | https://api.github.com/repos/kodadot/nft-gallery | closed | 💥⚰️ Vuex Options (MILESTONE) | performance 🍗 - schnitzel chief vue3 A-multi-chain | I see that we are getting various unwanted side effects by having / maintaining [vuex-options](https://github.com/kodadot/packages/tree/main/vuex-options)
So I will be adding issues to get rid of dependency on this package.
The it's deeply rooted in the codebase (because we were relying on it the past).
I'll be also hacking with some non-trivial ones
Tasks:
- [x] #5984
- [x] #5980
- [x] #5982
- [x] #5983
Issues caused by this:
- [x] #5977
| True | 💥⚰️ Vuex Options (MILESTONE) - I see that we are getting various unwanted side effects by having / maintaining [vuex-options](https://github.com/kodadot/packages/tree/main/vuex-options)
So I will be adding issues to get rid of dependency on this package.
The it's deeply rooted in the codebase (because we were relying on it the past).
I'll be also hacking with some non-trivial ones
Tasks:
- [x] #5984
- [x] #5980
- [x] #5982
- [x] #5983
Issues caused by this:
- [x] #5977
| non_priority | 💥⚰️ vuex options milestone i see that we are getting various unwanted side effects by having maintaining so i will be adding issues to get rid of dependency on this package the it s deeply rooted in the codebase because we were relying on it the past i ll be also hacking with some non trivial ones tasks issues caused by this | 0 |
28,244 | 13,616,264,882 | IssuesEvent | 2020-09-23 15:24:51 | cwpearson/stencil | https://api.github.com/repos/cwpearson/stencil | closed | MPI_Isend in remote sender can be very delayed | performance | A profile of `exchange-strong 60 60 60` on 1 2-socket P9 node with 4 V100s, using DomainKernel and Staged methods.

The host-to-host send is quite delayed from the pack/d2h copy, which completes shortly after it is initiated. This should be started as early as possible for two reasons:
1) to hide this latency
2) to overlap with CUDA as much as possible.
Possible solution: Start the stateful sender polling process more often and earlier, and suspend it if there is no work to do. Do we want to give the recvers opportunity to start early too? Probably not, as it might delay one of our sends?
| True | MPI_Isend in remote sender can be very delayed - A profile of `exchange-strong 60 60 60` on 1 2-socket P9 node with 4 V100s, using DomainKernel and Staged methods.

The host-to-host send is quite delayed from the pack/d2h copy, which completes shortly after it is initiated. This should be started as early as possible for two reasons:
1) to hide this latency
2) to overlap with CUDA as much as possible.
Possible solution: Start the stateful sender polling process more often and earlier, and suspend it if there is no work to do. Do we want to give the recvers opportunity to start early too? Probably not, as it might delay one of our sends?
| non_priority | mpi isend in remote sender can be very delayed a profile of exchange strong on socket node with using domainkernel and staged methods the host to host send is quite delayed from the pack copy which completes shortly after it is initiated this should be started as early as possible for two reasons to hide this latency to overlap with cuda as much as possible possible solution start the stateful sender polling process more often and earlier and suspend it if there is no work to do do we want to give the recvers opportunity to start early too probably not as it might delay one of our sends | 0 |
65,960 | 14,761,971,450 | IssuesEvent | 2021-01-09 01:12:45 | BryanLaura/Google-api-python-client | https://api.github.com/repos/BryanLaura/Google-api-python-client | opened | CVE-2012-6708 (Medium) detected in jquery-1.7.2.min.js, jquery-1.8.2.min.js | security vulnerability | ## CVE-2012-6708 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.2.min.js</b>, <b>jquery-1.8.2.min.js</b></p></summary>
<p>
<details><summary><b>jquery-1.7.2.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p>
<p>Path to dependency file: Google-api-python-client/node_modules/jmespath/index.html</p>
<p>Path to vulnerable library: Google-api-python-client/node_modules/jmespath/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.7.2.min.js** (Vulnerable Library)
</details>
<details><summary><b>jquery-1.8.2.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.2/jquery.min.js</a></p>
<p>Path to dependency file: Google-api-python-client/node_modules/errors/doc/html/errors.html</p>
<p>Path to vulnerable library: Google-api-python-client/node_modules/errors/doc/html/errors.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.8.2.min.js** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/BryanLaura/Google-api-python-client/commit/4e6b7ecb9b39fc7d86c420ddb87c5c3712578339">4e6b7ecb9b39fc7d86c420ddb87c5c3712578339</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v1.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2012-6708 (Medium) detected in jquery-1.7.2.min.js, jquery-1.8.2.min.js - ## CVE-2012-6708 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.2.min.js</b>, <b>jquery-1.8.2.min.js</b></p></summary>
<p>
<details><summary><b>jquery-1.7.2.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p>
<p>Path to dependency file: Google-api-python-client/node_modules/jmespath/index.html</p>
<p>Path to vulnerable library: Google-api-python-client/node_modules/jmespath/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.7.2.min.js** (Vulnerable Library)
</details>
<details><summary><b>jquery-1.8.2.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.2/jquery.min.js</a></p>
<p>Path to dependency file: Google-api-python-client/node_modules/errors/doc/html/errors.html</p>
<p>Path to vulnerable library: Google-api-python-client/node_modules/errors/doc/html/errors.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.8.2.min.js** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/BryanLaura/Google-api-python-client/commit/4e6b7ecb9b39fc7d86c420ddb87c5c3712578339">4e6b7ecb9b39fc7d86c420ddb87c5c3712578339</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v1.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in jquery min js jquery min js cve medium severity vulnerability vulnerable libraries jquery min js jquery min js jquery min js javascript library for dom operations library home page a href path to dependency file google api python client node modules jmespath index html path to vulnerable library google api python client node modules jmespath index html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file google api python client node modules errors doc html errors html path to vulnerable library google api python client node modules errors doc html errors html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch main vulnerability details jquery before is vulnerable to cross site scripting xss attacks the jquery strinput function does not differentiate selectors from html in a reliable fashion in vulnerable versions jquery determined whether the input was html by looking for the character anywhere in the string giving attackers more flexibility when attempting to construct a malicious payload in fixed versions jquery only deems the input to be html if it explicitly starts with the character limiting exploitability only to attackers who can control the beginning of a string which is far less common publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource | 0 |
96,982 | 10,974,128,348 | IssuesEvent | 2019-11-29 08:19:51 | TomasS666/frontend-data | https://api.github.com/repos/TomasS666/frontend-data | closed | Review Concept | documentation | Concept is nog wel aardig kort uitgelegd. Het idee is wel super gaaf voor zover ik begrijp. | 1.0 | Review Concept - Concept is nog wel aardig kort uitgelegd. Het idee is wel super gaaf voor zover ik begrijp. | non_priority | review concept concept is nog wel aardig kort uitgelegd het idee is wel super gaaf voor zover ik begrijp | 0 |
207,576 | 23,459,551,245 | IssuesEvent | 2022-08-16 11:59:24 | Gal-Doron/Baragon-test-9 | https://api.github.com/repos/Gal-Doron/Baragon-test-9 | opened | jetty-server-9.4.18.v20190429.jar: 5 vulnerabilities (highest severity is: 7.5) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p></summary>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2021-28165](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28165) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jetty-io-9.4.18.v20190429.jar | Transitive | 9.4.39.v20210325 | ✅ |
| [CVE-2021-28169](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28169) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | jetty-server-9.4.18.v20190429.jar | Direct | 9.4.41.v20210516 | ✅ |
| [CVE-2020-27218](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27218) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | jetty-server-9.4.18.v20190429.jar | Direct | 9.4.35.v20201120 | ✅ |
| [CVE-2021-34428](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34428) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.5 | jetty-server-9.4.18.v20190429.jar | Direct | 9.4.41.v20210516 | ✅ |
| [CVE-2022-2047](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-2047) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 2.7 | jetty-server-9.4.18.v20190429.jar | Direct | 9.4.47.v20220610 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-28165</summary>
### Vulnerable Library - <b>jetty-io-9.4.18.v20190429.jar</b></p>
<p>The Eclipse Jetty Project</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-io/9.4.18.v20190429/jetty-io-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-io/9.4.18.v20190429/jetty-io-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-io/9.4.18.v20190429/jetty-io-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- jetty-server-9.4.18.v20190429.jar (Root Library)
- :x: **jetty-io-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
<p>Publish Date: 2021-04-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28165>CVE-2021-28165</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w">https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w</a></p>
<p>Release Date: 2021-04-01</p>
<p>Fix Resolution (org.eclipse.jetty:jetty-io): 9.4.39.v20210325</p>
<p>Direct dependency fix Resolution (org.eclipse.jetty:jetty-server): 9.4.39.v20210325</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-28169</summary>
### Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
<p>Publish Date: 2021-06-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28169>CVE-2021-28169</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq">https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq</a></p>
<p>Release Date: 2021-06-09</p>
<p>Fix Resolution: 9.4.41.v20210516</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-27218</summary>
### Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
<p>Publish Date: 2020-11-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27218>CVE-2020-27218</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-86wm-rrjm-8wh8">https://github.com/eclipse/jetty.project/security/advisories/GHSA-86wm-rrjm-8wh8</a></p>
<p>Release Date: 2020-11-28</p>
<p>Fix Resolution: 9.4.35.v20201120</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2021-34428</summary>
### Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34428>CVE-2021-34428</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>3.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Physical
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6">https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: 9.4.41.v20210516</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2022-2047</summary>
### Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.
<p>Publish Date: 2022-07-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-2047>CVE-2022-2047</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>2.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q">https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q</a></p>
<p>Release Date: 2022-07-07</p>
<p>Fix Resolution: 9.4.47.v20220610</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | jetty-server-9.4.18.v20190429.jar: 5 vulnerabilities (highest severity is: 7.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p></summary>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2021-28165](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28165) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jetty-io-9.4.18.v20190429.jar | Transitive | 9.4.39.v20210325 | ✅ |
| [CVE-2021-28169](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28169) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | jetty-server-9.4.18.v20190429.jar | Direct | 9.4.41.v20210516 | ✅ |
| [CVE-2020-27218](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27218) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | jetty-server-9.4.18.v20190429.jar | Direct | 9.4.35.v20201120 | ✅ |
| [CVE-2021-34428](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34428) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.5 | jetty-server-9.4.18.v20190429.jar | Direct | 9.4.41.v20210516 | ✅ |
| [CVE-2022-2047](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-2047) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 2.7 | jetty-server-9.4.18.v20190429.jar | Direct | 9.4.47.v20220610 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-28165</summary>
### Vulnerable Library - <b>jetty-io-9.4.18.v20190429.jar</b></p>
<p>The Eclipse Jetty Project</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-io/9.4.18.v20190429/jetty-io-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-io/9.4.18.v20190429/jetty-io-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-io/9.4.18.v20190429/jetty-io-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- jetty-server-9.4.18.v20190429.jar (Root Library)
- :x: **jetty-io-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
<p>Publish Date: 2021-04-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28165>CVE-2021-28165</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w">https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w</a></p>
<p>Release Date: 2021-04-01</p>
<p>Fix Resolution (org.eclipse.jetty:jetty-io): 9.4.39.v20210325</p>
<p>Direct dependency fix Resolution (org.eclipse.jetty:jetty-server): 9.4.39.v20210325</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-28169</summary>
### Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
<p>Publish Date: 2021-06-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28169>CVE-2021-28169</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq">https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq</a></p>
<p>Release Date: 2021-06-09</p>
<p>Fix Resolution: 9.4.41.v20210516</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-27218</summary>
### Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
<p>Publish Date: 2020-11-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27218>CVE-2020-27218</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-86wm-rrjm-8wh8">https://github.com/eclipse/jetty.project/security/advisories/GHSA-86wm-rrjm-8wh8</a></p>
<p>Release Date: 2020-11-28</p>
<p>Fix Resolution: 9.4.35.v20201120</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2021-34428</summary>
### Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34428>CVE-2021-34428</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>3.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Physical
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6">https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: 9.4.41.v20210516</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2022-2047</summary>
### Vulnerable Library - <b>jetty-server-9.4.18.v20190429.jar</b></p>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: /BaragonData/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/sitory/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-9/commit/ad783b5f93a5095e0f7b4e1975fad0a54bdc7287">ad783b5f93a5095e0f7b4e1975fad0a54bdc7287</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.
<p>Publish Date: 2022-07-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-2047>CVE-2022-2047</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>2.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q">https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q</a></p>
<p>Release Date: 2022-07-07</p>
<p>Fix Resolution: 9.4.47.v20220610</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_priority | jetty server jar vulnerabilities highest severity is vulnerable library jetty server jar the core jetty server artifact library home page a href path to dependency file baragondata pom xml path to vulnerable library home wss scanner repository org eclipse jetty jetty server jetty server jar home wss scanner repository org eclipse jetty jetty server jetty server jar sitory org eclipse jetty jetty server jetty server jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high jetty io jar transitive medium jetty server jar direct medium jetty server jar direct low jetty server jar direct low jetty server jar direct details cve vulnerable library jetty io jar the eclipse jetty project library home page a href path to dependency file baragondata pom xml path to vulnerable library home wss scanner repository org eclipse jetty jetty io jetty io jar home wss scanner repository org eclipse jetty jetty io jetty io jar home wss scanner repository org eclipse jetty jetty io jetty io jar dependency hierarchy jetty server jar root library x jetty io jar vulnerable library found in head commit a href found in base branch master vulnerability details in eclipse jetty to to and to cpu usage can reach upon receiving a large invalid tls frame publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org eclipse jetty jetty io direct dependency fix resolution org eclipse jetty jetty server rescue worker helmet automatic remediation is available for this issue cve vulnerable library jetty server jar the core jetty server artifact library home page a href path to dependency file baragondata pom xml path to vulnerable library home wss scanner repository org eclipse jetty jetty server jetty server jar home wss scanner repository org eclipse jetty jetty server jetty server jar sitory org eclipse jetty jetty server jetty server jar dependency hierarchy x jetty server jar vulnerable library found in head commit a href found in base branch master vulnerability details for eclipse jetty versions it is possible for requests to the concatservlet with a doubly encoded path to access protected resources within the web inf directory for example a request to concat inf web xml can retrieve the web xml file this can reveal sensitive information regarding the implementation of a web application publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jetty server jar the core jetty server artifact library home page a href path to dependency file baragondata pom xml path to vulnerable library home wss scanner repository org eclipse jetty jetty server jetty server jar home wss scanner repository org eclipse jetty jetty server jetty server jar sitory org eclipse jetty jetty server jetty server jar dependency hierarchy x jetty server jar vulnerable library found in head commit a href found in base branch master vulnerability details in eclipse jetty version to to and to if gzip request body inflation is enabled and requests from different clients are multiplexed onto a single connection and if an attacker can send a request with a body that is received entirely but not consumed by the application then a subsequent request on the same connection will see that body prepended to its body the attacker will not see any data but may inject data into the body of the subsequent request publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jetty server jar the core jetty server artifact library home page a href path to dependency file baragondata pom xml path to vulnerable library home wss scanner repository org eclipse jetty jetty server jetty server jar home wss scanner repository org eclipse jetty jetty server jetty server jar sitory org eclipse jetty jetty server jetty server jar dependency hierarchy x jetty server jar vulnerable library found in head commit a href found in base branch master vulnerability details for eclipse jetty versions if an exception is thrown from the sessionlistener sessiondestroyed method then the session id is not invalidated in the session id manager on deployments with clustered sessions and multiple contexts this can result in a session not being invalidated this can result in an application used on a shared computer being left logged in publish date url a href cvss score details base score metrics exploitability metrics attack vector physical attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jetty server jar the core jetty server artifact library home page a href path to dependency file baragondata pom xml path to vulnerable library home wss scanner repository org eclipse jetty jetty server jetty server jar home wss scanner repository org eclipse jetty jetty server jetty server jar sitory org eclipse jetty jetty server jetty server jar dependency hierarchy x jetty server jar vulnerable library found in head commit a href found in base branch master vulnerability details in eclipse jetty versions thru and thru and thru versions the parsing of the authority segment of an http scheme uri the jetty httpuri class improperly detects an invalid input as a hostname this can lead to failures in a proxy scenario publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue | 0 |
117,214 | 25,071,897,044 | IssuesEvent | 2022-11-07 12:50:01 | SouJunior/vagas-frontend | https://api.github.com/repos/SouJunior/vagas-frontend | closed | Component: renomear ExtendedFooter.tsx | improvement code fix | Após mudanças no protótipo...
Renomear `ExtendedFooter.tsx` para `Footer.tsx`, e apagar o `SimpleFooter.tsx`.
### Lembrar de trocar o nome onde esse componente é chamado/usado, para evitar bugs. | 1.0 | Component: renomear ExtendedFooter.tsx - Após mudanças no protótipo...
Renomear `ExtendedFooter.tsx` para `Footer.tsx`, e apagar o `SimpleFooter.tsx`.
### Lembrar de trocar o nome onde esse componente é chamado/usado, para evitar bugs. | non_priority | component renomear extendedfooter tsx após mudanças no protótipo renomear extendedfooter tsx para footer tsx e apagar o simplefooter tsx lembrar de trocar o nome onde esse componente é chamado usado para evitar bugs | 0 |
174,354 | 21,261,141,088 | IssuesEvent | 2022-04-13 04:29:03 | Seagate/cortx-utils | https://api.github.com/repos/Seagate/cortx-utils | reopened | CVE-2021-34141 (Medium) detected in numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl | needs-attention security vulnerability | ## CVE-2021-34141 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl</b>, <b>numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl</b></p></summary>
<p>
<details><summary><b>numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>NumPy is the fundamental package for array computing with Python.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/08/d6/a6aaa29fea945bc6c61d11f6e0697b325ff7446de5ffd62c2fa02f627048/numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/08/d6/a6aaa29fea945bc6c61d11f6e0697b325ff7446de5ffd62c2fa02f627048/numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /py-utils</p>
<p>Path to vulnerable library: /py-utils,/py-utils/test,/py-utils/src/utils/setup/openldap/openldap,/py-utils/src/setup/utils,/py-utils/src/utils/setup/kafka/kafka</p>
<p>
Dependency Hierarchy:
- :x: **numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<details><summary><b>numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl</b></p></summary>
<p>NumPy is the fundamental package for array computing with Python.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/50/46/292cff79f5b30151b027400efdb3f740ea03271b600751b6696cf550c10d/numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/50/46/292cff79f5b30151b027400efdb3f740ea03271b600751b6696cf550c10d/numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /py-utils/src/setup/utils</p>
<p>Path to vulnerable library: /py-utils/src/setup/utils,/py-utils/src/utils/setup/openldap/openldap,/py-utils/python_requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Seagate/cortx-utils/commit/34d8f36457431764da33382883c1f8e70c32ed2d">34d8f36457431764da33382883c1f8e70c32ed2d</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."
WhiteSource Note: After conducting further research, WhiteSource has determined that versions 1.12.0 through 1.21.5 of numpy are vulnerable to CVE-2021-34141
<p>Publish Date: 2021-12-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34141>CVE-2021-34141</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34141">https://nvd.nist.gov/vuln/detail/CVE-2021-34141</a></p>
<p>Release Date: 2021-12-17</p>
<p>Fix Resolution: numpy - 1.22.0rc1,1.12.0b1;numpy-base - 1.16.2;numpy - 1.13.2,1.17.4;albatradis - 1.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"numpy","packageVersion":"1.19.5","packageFilePaths":["/py-utils"],"isTransitiveDependency":false,"dependencyTree":"numpy:1.19.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"numpy - 1.22.0rc1,1.12.0b1;numpy-base - 1.16.2;numpy - 1.13.2,1.17.4;albatradis - 1.0.1","isBinary":false},{"packageType":"Python","packageName":"numpy","packageVersion":"1.21.5","packageFilePaths":["/py-utils/src/setup/utils"],"isTransitiveDependency":false,"dependencyTree":"numpy:1.21.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"numpy - 1.22.0rc1,1.12.0b1;numpy-base - 1.16.2;numpy - 1.13.2,1.17.4;albatradis - 1.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-34141","vulnerabilityDetails":"An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is \"completely harmless.\"\n WhiteSource Note: After conducting further research, WhiteSource has determined that versions 1.12.0 through 1.21.5 of numpy are vulnerable to CVE-2021-34141","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34141","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-34141 (Medium) detected in numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl - ## CVE-2021-34141 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl</b>, <b>numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl</b></p></summary>
<p>
<details><summary><b>numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>NumPy is the fundamental package for array computing with Python.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/08/d6/a6aaa29fea945bc6c61d11f6e0697b325ff7446de5ffd62c2fa02f627048/numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/08/d6/a6aaa29fea945bc6c61d11f6e0697b325ff7446de5ffd62c2fa02f627048/numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /py-utils</p>
<p>Path to vulnerable library: /py-utils,/py-utils/test,/py-utils/src/utils/setup/openldap/openldap,/py-utils/src/setup/utils,/py-utils/src/utils/setup/kafka/kafka</p>
<p>
Dependency Hierarchy:
- :x: **numpy-1.19.5-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<details><summary><b>numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl</b></p></summary>
<p>NumPy is the fundamental package for array computing with Python.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/50/46/292cff79f5b30151b027400efdb3f740ea03271b600751b6696cf550c10d/numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/50/46/292cff79f5b30151b027400efdb3f740ea03271b600751b6696cf550c10d/numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /py-utils/src/setup/utils</p>
<p>Path to vulnerable library: /py-utils/src/setup/utils,/py-utils/src/utils/setup/openldap/openldap,/py-utils/python_requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **numpy-1.21.5-cp37-cp37m-manylinux_2_12_x86_64.manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Seagate/cortx-utils/commit/34d8f36457431764da33382883c1f8e70c32ed2d">34d8f36457431764da33382883c1f8e70c32ed2d</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."
WhiteSource Note: After conducting further research, WhiteSource has determined that versions 1.12.0 through 1.21.5 of numpy are vulnerable to CVE-2021-34141
<p>Publish Date: 2021-12-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34141>CVE-2021-34141</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34141">https://nvd.nist.gov/vuln/detail/CVE-2021-34141</a></p>
<p>Release Date: 2021-12-17</p>
<p>Fix Resolution: numpy - 1.22.0rc1,1.12.0b1;numpy-base - 1.16.2;numpy - 1.13.2,1.17.4;albatradis - 1.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"numpy","packageVersion":"1.19.5","packageFilePaths":["/py-utils"],"isTransitiveDependency":false,"dependencyTree":"numpy:1.19.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"numpy - 1.22.0rc1,1.12.0b1;numpy-base - 1.16.2;numpy - 1.13.2,1.17.4;albatradis - 1.0.1","isBinary":false},{"packageType":"Python","packageName":"numpy","packageVersion":"1.21.5","packageFilePaths":["/py-utils/src/setup/utils"],"isTransitiveDependency":false,"dependencyTree":"numpy:1.21.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"numpy - 1.22.0rc1,1.12.0b1;numpy-base - 1.16.2;numpy - 1.13.2,1.17.4;albatradis - 1.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-34141","vulnerabilityDetails":"An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is \"completely harmless.\"\n WhiteSource Note: After conducting further research, WhiteSource has determined that versions 1.12.0 through 1.21.5 of numpy are vulnerable to CVE-2021-34141","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34141","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in numpy whl cve medium severity vulnerability vulnerable libraries numpy whl numpy manylinux whl numpy whl numpy is the fundamental package for array computing with python library home page a href path to dependency file py utils path to vulnerable library py utils py utils test py utils src utils setup openldap openldap py utils src setup utils py utils src utils setup kafka kafka dependency hierarchy x numpy whl vulnerable library numpy manylinux whl numpy is the fundamental package for array computing with python library home page a href path to dependency file py utils src setup utils path to vulnerable library py utils src setup utils py utils src utils setup openldap openldap py utils python requirements txt dependency hierarchy x numpy manylinux whl vulnerable library found in head commit a href found in base branch main vulnerability details an incomplete string comparison in the numpy core component in numpy before allows attackers to trigger slightly incorrect copying by constructing specific string objects note the vendor states that this reported code behavior is completely harmless whitesource note after conducting further research whitesource has determined that versions through of numpy are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution numpy numpy base numpy albatradis isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree numpy isminimumfixversionavailable true minimumfixversion numpy numpy base numpy albatradis isbinary false packagetype python packagename numpy packageversion packagefilepaths istransitivedependency false dependencytree numpy isminimumfixversionavailable true minimumfixversion numpy numpy base numpy albatradis isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails an incomplete string comparison in the numpy core component in numpy before allows attackers to trigger slightly incorrect copying by constructing specific string objects note the vendor states that this reported code behavior is completely harmless n whitesource note after conducting further research whitesource has determined that versions through of numpy are vulnerable to cve vulnerabilityurl | 0 |
258,306 | 22,301,585,538 | IssuesEvent | 2022-06-13 09:12:33 | ibissource/ladybug-frontend | https://api.github.com/repos/ibissource/ladybug-frontend | closed | Rerun report failure, replace, succeed | Testing | * Create reports in tab debug and copy to test tab.
* Go to test tab.
* Check that button “run all” is disabled.
* Select one report, rerun.
* Check that it has failed.
* Click “Replace”.
* Rerun the report.
* Check that it succeeds.
| 1.0 | Rerun report failure, replace, succeed - * Create reports in tab debug and copy to test tab.
* Go to test tab.
* Check that button “run all” is disabled.
* Select one report, rerun.
* Check that it has failed.
* Click “Replace”.
* Rerun the report.
* Check that it succeeds.
| non_priority | rerun report failure replace succeed create reports in tab debug and copy to test tab go to test tab check that button “run all” is disabled select one report rerun check that it has failed click “replace” rerun the report check that it succeeds | 0 |
12,304 | 5,186,160,789 | IssuesEvent | 2017-01-20 13:06:55 | yandex/ClickHouse | https://api.github.com/repos/yandex/ClickHouse | closed | Build failed on FreeBSD | build | Try to build by doc/build_freebsd.sh instructions on freebsd11
`>cmake --version
cmake version 3.7.1
`
`>cmake .. -DCMAKE_CXX_COMPILER=`which g++6` -DCMAKE_C_COMPILER=`which gcc6`
CMake Error: The source directory "/home/user/work/ClickHouse/build/found" does not exist.
` | 1.0 | Build failed on FreeBSD - Try to build by doc/build_freebsd.sh instructions on freebsd11
`>cmake --version
cmake version 3.7.1
`
`>cmake .. -DCMAKE_CXX_COMPILER=`which g++6` -DCMAKE_C_COMPILER=`which gcc6`
CMake Error: The source directory "/home/user/work/ClickHouse/build/found" does not exist.
` | non_priority | build failed on freebsd try to build by doc build freebsd sh instructions on cmake version cmake version cmake dcmake cxx compiler which g dcmake c compiler which cmake error the source directory home user work clickhouse build found does not exist | 0 |
62,450 | 26,003,783,570 | IssuesEvent | 2022-12-20 17:22:38 | BCDevOps/developer-experience | https://api.github.com/repos/BCDevOps/developer-experience | closed | OCP 4.11 Verify new Samples images and Templates | team/DXC ops and shared services | **Describe the issue**
The Samples Operator manages the imagestreams and templates in the `openshift` namespace. With each new version of OCP some samples are added and removed. There is a playbook that sets exclusions to trim down which samples are available on the cluster. Determine which images/templates are new and work with Platform Services to understand which to keep or exclude. Update the playbook to exclude any new images and remove any exclusions that are no longer needed.
New imagestreams that we are skipping:
- fuse7-eap-openshift-java11
- fuse7-java11-openshift
- fuse7-karaf-openshift-jdk11
- jboss-eap-xp4-openjdk11-openshift
- jboss-eap-xp4-openjdk11-runtime-openshift
New template we are skipping:
- eap-xp4-basic-s2i
Full list of skipped templates is located at https://github.com/bcgov-c/platform-ops/blob/main/roles/config-infra/defaults/main.yaml
**Additional context**
https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html
**Definition of done**
- [x] Confirm with stakeholders which new samples to keep if any.
- [x] PR to update the samples playbook. | 1.0 | OCP 4.11 Verify new Samples images and Templates - **Describe the issue**
The Samples Operator manages the imagestreams and templates in the `openshift` namespace. With each new version of OCP some samples are added and removed. There is a playbook that sets exclusions to trim down which samples are available on the cluster. Determine which images/templates are new and work with Platform Services to understand which to keep or exclude. Update the playbook to exclude any new images and remove any exclusions that are no longer needed.
New imagestreams that we are skipping:
- fuse7-eap-openshift-java11
- fuse7-java11-openshift
- fuse7-karaf-openshift-jdk11
- jboss-eap-xp4-openjdk11-openshift
- jboss-eap-xp4-openjdk11-runtime-openshift
New template we are skipping:
- eap-xp4-basic-s2i
Full list of skipped templates is located at https://github.com/bcgov-c/platform-ops/blob/main/roles/config-infra/defaults/main.yaml
**Additional context**
https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html
**Definition of done**
- [x] Confirm with stakeholders which new samples to keep if any.
- [x] PR to update the samples playbook. | non_priority | ocp verify new samples images and templates describe the issue the samples operator manages the imagestreams and templates in the openshift namespace with each new version of ocp some samples are added and removed there is a playbook that sets exclusions to trim down which samples are available on the cluster determine which images templates are new and work with platform services to understand which to keep or exclude update the playbook to exclude any new images and remove any exclusions that are no longer needed new imagestreams that we are skipping eap openshift openshift karaf openshift jboss eap openshift jboss eap runtime openshift new template we are skipping eap basic full list of skipped templates is located at additional context definition of done confirm with stakeholders which new samples to keep if any pr to update the samples playbook | 0 |
106,788 | 13,386,058,261 | IssuesEvent | 2020-09-02 14:15:36 | hpe-design/design-system | https://api.github.com/repos/hpe-design/design-system | opened | Add "real world" example or guidance to modal example within Layer component | design | - Add example with a button
- Maybe a checkbox
We might be able to also add more guidance within each example.
Note: It looks like there is also an alignment issues with the "mail" icon. Ill defer to the designers but I believe the icon should align with top/bottom of text.

| 1.0 | Add "real world" example or guidance to modal example within Layer component - - Add example with a button
- Maybe a checkbox
We might be able to also add more guidance within each example.
Note: It looks like there is also an alignment issues with the "mail" icon. Ill defer to the designers but I believe the icon should align with top/bottom of text.

| non_priority | add real world example or guidance to modal example within layer component add example with a button maybe a checkbox we might be able to also add more guidance within each example note it looks like there is also an alignment issues with the mail icon ill defer to the designers but i believe the icon should align with top bottom of text | 0 |
155,817 | 19,803,040,231 | IssuesEvent | 2022-01-19 01:23:06 | vlaship/spark-streaming | https://api.github.com/repos/vlaship/spark-streaming | opened | CVE-2022-23305 (High) detected in log4j-1.2.17.jar | security vulnerability | ## CVE-2022-23305 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/root/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- spark-streaming_2.11-2.2.0.jar (Root Library)
- spark-core_2.11-2.2.0.jar
- hadoop-client-2.6.5.jar
- hadoop-hdfs-2.6.5.jar
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23305>CVE-2022-23305</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-23305 (High) detected in log4j-1.2.17.jar - ## CVE-2022-23305 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/root/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- spark-streaming_2.11-2.2.0.jar (Root Library)
- spark-core_2.11-2.2.0.jar
- hadoop-client-2.6.5.jar
- hadoop-hdfs-2.6.5.jar
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23305>CVE-2022-23305</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jar cve high severity vulnerability vulnerable library jar apache path to dependency file build gradle path to vulnerable library root gradle caches modules files jar root gradle caches modules files jar dependency hierarchy spark streaming jar root library spark core jar hadoop client jar hadoop hdfs jar x jar vulnerable library vulnerability details by design the jdbcappender in x accepts an sql statement as a configuration parameter where the values to be inserted are converters from patternlayout the message converter m is likely to always be included this allows attackers to manipulate the sql by entering crafted strings into input fields or headers of an application that are logged allowing unintended sql queries to be executed note this issue only affects x when specifically configured to use the jdbcappender which is not the default beginning in version the jdbcappender was re introduced with proper support for parameterized sql queries and further customization over the columns written to in logs apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href step up your open source security game with whitesource | 0 |
65,335 | 7,872,910,249 | IssuesEvent | 2018-06-25 12:50:32 | usds/us-forms-system | https://api.github.com/repos/usds/us-forms-system | closed | Make an inventory of all features currently offered by the Forms library | [practice] design [practice] product [type] research | - [x] List everything from forms on Vets.gov
- [x] Add anything that is not there but IS included in react-json-schema-form (RJSF). | 1.0 | Make an inventory of all features currently offered by the Forms library - - [x] List everything from forms on Vets.gov
- [x] Add anything that is not there but IS included in react-json-schema-form (RJSF). | non_priority | make an inventory of all features currently offered by the forms library list everything from forms on vets gov add anything that is not there but is included in react json schema form rjsf | 0 |
63,169 | 7,697,877,179 | IssuesEvent | 2018-05-18 20:29:50 | gitburn/gitburn | https://api.github.com/repos/gitburn/gitburn | closed | Branch selection in "Merge" should use the branches list | design | As of #745, in the Merge popup we show the branches list using a `<select>`
This sucks in a couple ways:
1. Filtering is hard.
2. No grouping. | 1.0 | Branch selection in "Merge" should use the branches list - As of #745, in the Merge popup we show the branches list using a `<select>`
This sucks in a couple ways:
1. Filtering is hard.
2. No grouping. | non_priority | branch selection in merge should use the branches list as of in the merge popup we show the branches list using a this sucks in a couple ways filtering is hard no grouping | 0 |
183,887 | 31,779,754,719 | IssuesEvent | 2023-09-12 16:34:01 | department-of-veterans-affairs/va.gov-cms | https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms | opened | Implement multiselect checkbox dropdowns into the CMS | Needs refining CMS design system CMS Team | ## Description
- As a designer, I want to have a component in the design system that allows for a good UX when selecting multiple options from a large list, so that I can use this component in places where it would solve a UX problem for my product.
- As a developer, I want to blank, so that blank.
- As a CMS Editor, I want to be able to easily select multiple options from a large list so that I can do what I need to do and move on to the next task.
## Atomic Level
These levels match the levels in [VA.gov Design System Documentation](https://design.va.gov/)
- [ ] **Foundation** - The Foundation section provides information about the visual language and styles used in the CMS.
- [x] **Component** - Components are interactive and non-interactive UI elements that can be grouped together or presented individually. They are independent, reusable chunks of a user interface.
- [ ] **Pattern** - Patterns are solutions and researched best practices for solving user-focused tasks and recurring user interface design problems.
- [ ] **Template** - Templates, or page layouts, compose components within a single page. A layout can contain multiple variations of a component depending on the context.
## Acceptance Criteria
**Implement design system updates**
- [ ] [Replace me outlining specific things that need to be done for this dev implementation ticket.]
- [ ] Ensure that (insert thing here) is updated to reflect the changes listed above.
**Collab with Design**
- [ ] Set up a meeting to collaborate with the designer who made the updates in the design system.
- [ ] Add the designer who made the updates in the design system as a reviewer on the pull request.
- [ ] Tag the designer who made the updates in the design system in a Slack message in the #sitewide-cms-platform channel letting them know that the pull request is ready for their review.
| 1.0 | Implement multiselect checkbox dropdowns into the CMS - ## Description
- As a designer, I want to have a component in the design system that allows for a good UX when selecting multiple options from a large list, so that I can use this component in places where it would solve a UX problem for my product.
- As a developer, I want to blank, so that blank.
- As a CMS Editor, I want to be able to easily select multiple options from a large list so that I can do what I need to do and move on to the next task.
## Atomic Level
These levels match the levels in [VA.gov Design System Documentation](https://design.va.gov/)
- [ ] **Foundation** - The Foundation section provides information about the visual language and styles used in the CMS.
- [x] **Component** - Components are interactive and non-interactive UI elements that can be grouped together or presented individually. They are independent, reusable chunks of a user interface.
- [ ] **Pattern** - Patterns are solutions and researched best practices for solving user-focused tasks and recurring user interface design problems.
- [ ] **Template** - Templates, or page layouts, compose components within a single page. A layout can contain multiple variations of a component depending on the context.
## Acceptance Criteria
**Implement design system updates**
- [ ] [Replace me outlining specific things that need to be done for this dev implementation ticket.]
- [ ] Ensure that (insert thing here) is updated to reflect the changes listed above.
**Collab with Design**
- [ ] Set up a meeting to collaborate with the designer who made the updates in the design system.
- [ ] Add the designer who made the updates in the design system as a reviewer on the pull request.
- [ ] Tag the designer who made the updates in the design system in a Slack message in the #sitewide-cms-platform channel letting them know that the pull request is ready for their review.
| non_priority | implement multiselect checkbox dropdowns into the cms description as a designer i want to have a component in the design system that allows for a good ux when selecting multiple options from a large list so that i can use this component in places where it would solve a ux problem for my product as a developer i want to blank so that blank as a cms editor i want to be able to easily select multiple options from a large list so that i can do what i need to do and move on to the next task atomic level these levels match the levels in foundation the foundation section provides information about the visual language and styles used in the cms component components are interactive and non interactive ui elements that can be grouped together or presented individually they are independent reusable chunks of a user interface pattern patterns are solutions and researched best practices for solving user focused tasks and recurring user interface design problems template templates or page layouts compose components within a single page a layout can contain multiple variations of a component depending on the context acceptance criteria implement design system updates ensure that insert thing here is updated to reflect the changes listed above collab with design set up a meeting to collaborate with the designer who made the updates in the design system add the designer who made the updates in the design system as a reviewer on the pull request tag the designer who made the updates in the design system in a slack message in the sitewide cms platform channel letting them know that the pull request is ready for their review | 0 |
43,579 | 9,461,983,754 | IssuesEvent | 2019-04-17 14:33:32 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | [3.9.x] [a11y] Number of positions selector is not accessible | Accessibility J3 Issue No Code Attached Yet | ### Steps to reproduce the issue
1. Use screen reader, e.g. NVDA
2. Go to the search results list page (for ex. use search module to search for a popular word, e.g. joomla on a test site)
3. Go to "Display #" list.
4. Select any number position
### Expected result
1. The screen reader announces the selected number of items
2. After pressing the Enter key, the page is reloaded and the selected number of items is displayed.
### Actual result
1. The screen reader not announces the selected number
2. After a while, the page is automatically reloaded.
### Note
The same error occurs on a **Tagged items** page type. | 1.0 | [3.9.x] [a11y] Number of positions selector is not accessible - ### Steps to reproduce the issue
1. Use screen reader, e.g. NVDA
2. Go to the search results list page (for ex. use search module to search for a popular word, e.g. joomla on a test site)
3. Go to "Display #" list.
4. Select any number position
### Expected result
1. The screen reader announces the selected number of items
2. After pressing the Enter key, the page is reloaded and the selected number of items is displayed.
### Actual result
1. The screen reader not announces the selected number
2. After a while, the page is automatically reloaded.
### Note
The same error occurs on a **Tagged items** page type. | non_priority | number of positions selector is not accessible steps to reproduce the issue use screen reader e g nvda go to the search results list page for ex use search module to search for a popular word e g joomla on a test site go to display list select any number position expected result the screen reader announces the selected number of items after pressing the enter key the page is reloaded and the selected number of items is displayed actual result the screen reader not announces the selected number after a while the page is automatically reloaded note the same error occurs on a tagged items page type | 0 |
312,862 | 23,446,225,208 | IssuesEvent | 2022-08-15 19:56:49 | vercel/next.js | https://api.github.com/repos/vercel/next.js | opened | Docs: | template: documentation | ### What is the improvement or update you wish to see?
I created a PR ([vercel/next.js: Pull Request 39228](https://github.com/vercel/next.js/pull/39228)) a few days ago about supporting Next.js app deployment for China, and @leerob mentioned pushing it back on the issue stage, so I'm creating this issue here for other devs to review.
### Is there any context that might help us understand?
A quick background brief: Mainland China is unlike any other country. Vercel or Netlify-like deployment solutions don't exist. [Vercel](https://www.21cloudbox.com/solutions/how-to-speed-up-vercel-in-china.html#:~:text=Does%20Vercel%20work%20in%20China%3F) and [Netlify](https://www.21cloudbox.com/solutions/alternatives-to-netlify-in-china.html) don't work out-of-the-box in China due to their Firewall and other legal issues.
21YunBox created [guides](https://www.21cloudbox.com/solutions/how-to-speed-up-vercel-in-china.html) to make deployment of Next.js apps easy like Vercel for China. If you think this is good conjunction for the Nextjs app in China, I think adding some links on the [next.js docs](https://nextjs.org/docs/deployment) would definitely help developers get less headache for deployment in China.
Do leave comments here, so I know what you guys think.
### Does the docs page already exist? Please link to it.
https://nextjs.org/docs/deployment | 1.0 | Docs: - ### What is the improvement or update you wish to see?
I created a PR ([vercel/next.js: Pull Request 39228](https://github.com/vercel/next.js/pull/39228)) a few days ago about supporting Next.js app deployment for China, and @leerob mentioned pushing it back on the issue stage, so I'm creating this issue here for other devs to review.
### Is there any context that might help us understand?
A quick background brief: Mainland China is unlike any other country. Vercel or Netlify-like deployment solutions don't exist. [Vercel](https://www.21cloudbox.com/solutions/how-to-speed-up-vercel-in-china.html#:~:text=Does%20Vercel%20work%20in%20China%3F) and [Netlify](https://www.21cloudbox.com/solutions/alternatives-to-netlify-in-china.html) don't work out-of-the-box in China due to their Firewall and other legal issues.
21YunBox created [guides](https://www.21cloudbox.com/solutions/how-to-speed-up-vercel-in-china.html) to make deployment of Next.js apps easy like Vercel for China. If you think this is good conjunction for the Nextjs app in China, I think adding some links on the [next.js docs](https://nextjs.org/docs/deployment) would definitely help developers get less headache for deployment in China.
Do leave comments here, so I know what you guys think.
### Does the docs page already exist? Please link to it.
https://nextjs.org/docs/deployment | non_priority | docs what is the improvement or update you wish to see i created a pr a few days ago about supporting next js app deployment for china and leerob mentioned pushing it back on the issue stage so i m creating this issue here for other devs to review is there any context that might help us understand a quick background brief mainland china is unlike any other country vercel or netlify like deployment solutions don t exist and don t work out of the box in china due to their firewall and other legal issues created to make deployment of next js apps easy like vercel for china if you think this is good conjunction for the nextjs app in china i think adding some links on the would definitely help developers get less headache for deployment in china do leave comments here so i know what you guys think does the docs page already exist please link to it | 0 |
213,212 | 23,966,153,760 | IssuesEvent | 2022-09-13 01:17:10 | Satheesh575555/linux-4.1.15 | https://api.github.com/repos/Satheesh575555/linux-4.1.15 | closed | WS-2021-0519 (Medium) detected in linuxlinux-4.6 - autoclosed | security vulnerability | ## WS-2021-0519 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/scsi/mpt3sas/mpt3sas_scsih.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/scsi/mpt3sas/mpt3sas_scsih.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
scsi: mpt3sas: Fix kernel panic during drive powercycle test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 8485649a7655e791a6e4e9f15b4d30fdae937184, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link.
<p>Publish Date: 2021-12-19
<p>URL: <a href=https://github.com/gregkh/linux/commit/8485649a7655e791a6e4e9f15b4d30fdae937184>WS-2021-0519</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://osv.dev/vulnerability/GSD-2021-1002533">https://osv.dev/vulnerability/GSD-2021-1002533</a></p>
<p>Release Date: 2021-12-19</p>
<p>Fix Resolution: v5.15.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2021-0519 (Medium) detected in linuxlinux-4.6 - autoclosed - ## WS-2021-0519 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/scsi/mpt3sas/mpt3sas_scsih.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/scsi/mpt3sas/mpt3sas_scsih.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
scsi: mpt3sas: Fix kernel panic during drive powercycle test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 8485649a7655e791a6e4e9f15b4d30fdae937184, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link.
<p>Publish Date: 2021-12-19
<p>URL: <a href=https://github.com/gregkh/linux/commit/8485649a7655e791a6e4e9f15b4d30fdae937184>WS-2021-0519</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://osv.dev/vulnerability/GSD-2021-1002533">https://osv.dev/vulnerability/GSD-2021-1002533</a></p>
<p>Release Date: 2021-12-19</p>
<p>Fix Resolution: v5.15.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in linuxlinux autoclosed ws medium severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in base branch master vulnerable source files drivers scsi scsih c drivers scsi scsih c vulnerability details scsi fix kernel panic during drive powercycle test this is an automated id intended to aid in discovery of potential security vulnerabilities the actual impact and attack plausibility have not yet been proven this id is fixed in linux kernel version by commit it was introduced in version by commit for more details please see the references link publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
20,638 | 27,316,804,393 | IssuesEvent | 2023-02-24 16:18:57 | MicrosoftDocs/azure-devops-docs | https://api.github.com/repos/MicrosoftDocs/azure-devops-docs | closed | docs: don't use the term "main pipeline" | devops/prod doc-bug Pri1 devops-cicd-process/tech | On the [template types and usages](https://docs.microsoft.com/en-us/azure/devops/pipelines/process/templates?view=azure-devops#use-other-repositories) page, the docs state:
> You may also use `@self` to refer to the repository where the main pipeline was found.
This comes right after the following Note:
> If no ref is specified, the pipeline will default to using refs/heads/main.
At this point, it's a bit confusing what the "main" pipeline is: the one with the entry point that's run, or the one in the "main" branch.
The next sentence makes it clear, but maybe the first one could be reworded...
> This is convenient for use in extends templates if you want to refer back to contents in the extending pipeline's repository. For example:
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 6724abea-bbdc-bf66-ed5e-3214fa6c3e66
* Version Independent ID: 4f8dab21-3f0e-da32-cc0e-1d85c13c0065
* Content: [Templates - Azure Pipelines](https://docs.microsoft.com/en-us/azure/devops/pipelines/process/templates?view=azure-devops)
* Content Source: [docs/pipelines/process/templates.md](https://github.com/MicrosoftDocs/azure-devops-docs/blob/main/docs/pipelines/process/templates.md)
* Product: **devops**
* Technology: **devops-cicd-process**
* GitHub Login: @juliakm
* Microsoft Alias: **jukullam** | 1.0 | docs: don't use the term "main pipeline" - On the [template types and usages](https://docs.microsoft.com/en-us/azure/devops/pipelines/process/templates?view=azure-devops#use-other-repositories) page, the docs state:
> You may also use `@self` to refer to the repository where the main pipeline was found.
This comes right after the following Note:
> If no ref is specified, the pipeline will default to using refs/heads/main.
At this point, it's a bit confusing what the "main" pipeline is: the one with the entry point that's run, or the one in the "main" branch.
The next sentence makes it clear, but maybe the first one could be reworded...
> This is convenient for use in extends templates if you want to refer back to contents in the extending pipeline's repository. For example:
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 6724abea-bbdc-bf66-ed5e-3214fa6c3e66
* Version Independent ID: 4f8dab21-3f0e-da32-cc0e-1d85c13c0065
* Content: [Templates - Azure Pipelines](https://docs.microsoft.com/en-us/azure/devops/pipelines/process/templates?view=azure-devops)
* Content Source: [docs/pipelines/process/templates.md](https://github.com/MicrosoftDocs/azure-devops-docs/blob/main/docs/pipelines/process/templates.md)
* Product: **devops**
* Technology: **devops-cicd-process**
* GitHub Login: @juliakm
* Microsoft Alias: **jukullam** | non_priority | docs don t use the term main pipeline on the page the docs state you may also use self to refer to the repository where the main pipeline was found this comes right after the following note if no ref is specified the pipeline will default to using refs heads main at this point it s a bit confusing what the main pipeline is the one with the entry point that s run or the one in the main branch the next sentence makes it clear but maybe the first one could be reworded this is convenient for use in extends templates if you want to refer back to contents in the extending pipeline s repository for example document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id bbdc version independent id content content source product devops technology devops cicd process github login juliakm microsoft alias jukullam | 0 |
2,079 | 4,357,623,103 | IssuesEvent | 2016-08-02 03:00:49 | flyingSprite/bijou | https://api.github.com/repos/flyingSprite/bijou | reopened | Set app icon, splash, and name for ionic app on IOS. | requirement | I create an ionic app, and import in my iphone. But it uses cordova app icon and use "HelloCordova" name. So I need to set a new icon and a new name for my App | 1.0 | Set app icon, splash, and name for ionic app on IOS. - I create an ionic app, and import in my iphone. But it uses cordova app icon and use "HelloCordova" name. So I need to set a new icon and a new name for my App | non_priority | set app icon splash and name for ionic app on ios i create an ionic app and import in my iphone but it uses cordova app icon and use hellocordova name so i need to set a new icon and a new name for my app | 0 |
320,941 | 23,832,422,030 | IssuesEvent | 2022-09-05 23:35:31 | marcosdosea/AgendeMe | https://api.github.com/repos/marcosdosea/AgendeMe | closed | Remover relação entre as entidades "Cidadao" e "Especialidade" no modelo de banco de dados | documentation | Inicialmente, não será tratada a questão das especialidades que os profissionais podem possuir. Deste modo, a relação deve ser deletada e, a entidade "Especialidade" deve ser excluída no modelo do banco de dados. | 1.0 | Remover relação entre as entidades "Cidadao" e "Especialidade" no modelo de banco de dados - Inicialmente, não será tratada a questão das especialidades que os profissionais podem possuir. Deste modo, a relação deve ser deletada e, a entidade "Especialidade" deve ser excluída no modelo do banco de dados. | non_priority | remover relação entre as entidades cidadao e especialidade no modelo de banco de dados inicialmente não será tratada a questão das especialidades que os profissionais podem possuir deste modo a relação deve ser deletada e a entidade especialidade deve ser excluída no modelo do banco de dados | 0 |
100,461 | 16,489,885,955 | IssuesEvent | 2021-05-25 01:05:44 | billmcchesney1/t-vault | https://api.github.com/repos/billmcchesney1/t-vault | opened | CVE-2021-23369 (High) detected in handlebars-4.7.6.tgz | security vulnerability | ## CVE-2021-23369 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.7.6.tgz</b></p></summary>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.7.6.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.7.6.tgz</a></p>
<p>Path to dependency file: t-vault/tvaultui/package.json</p>
<p>Path to vulnerable library: t-vault/tvaultui/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- gulp-eslint-1.0.0.tgz (Root Library)
- eslint-1.10.3.tgz
- :x: **handlebars-4.7.6.tgz** (Vulnerable Library)
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
<p>Publish Date: 2021-04-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23369>CVE-2021-23369</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23369">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23369</a></p>
<p>Release Date: 2021-04-12</p>
<p>Fix Resolution: handlebars - 4.7.7</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"4.7.6","packageFilePaths":["/tvaultui/package.json"],"isTransitiveDependency":true,"dependencyTree":"gulp-eslint:1.0.0;eslint:1.10.3;handlebars:4.7.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"handlebars - 4.7.7"}],"baseBranches":["dev"],"vulnerabilityIdentifier":"CVE-2021-23369","vulnerabilityDetails":"The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23369","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-23369 (High) detected in handlebars-4.7.6.tgz - ## CVE-2021-23369 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.7.6.tgz</b></p></summary>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.7.6.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.7.6.tgz</a></p>
<p>Path to dependency file: t-vault/tvaultui/package.json</p>
<p>Path to vulnerable library: t-vault/tvaultui/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- gulp-eslint-1.0.0.tgz (Root Library)
- eslint-1.10.3.tgz
- :x: **handlebars-4.7.6.tgz** (Vulnerable Library)
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
<p>Publish Date: 2021-04-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23369>CVE-2021-23369</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23369">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23369</a></p>
<p>Release Date: 2021-04-12</p>
<p>Fix Resolution: handlebars - 4.7.7</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"4.7.6","packageFilePaths":["/tvaultui/package.json"],"isTransitiveDependency":true,"dependencyTree":"gulp-eslint:1.0.0;eslint:1.10.3;handlebars:4.7.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"handlebars - 4.7.7"}],"baseBranches":["dev"],"vulnerabilityIdentifier":"CVE-2021-23369","vulnerabilityDetails":"The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23369","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in handlebars tgz cve high severity vulnerability vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file t vault tvaultui package json path to vulnerable library t vault tvaultui node modules handlebars package json dependency hierarchy gulp eslint tgz root library eslint tgz x handlebars tgz vulnerable library found in base branch dev vulnerability details the package handlebars before are vulnerable to remote code execution rce when selecting certain compiling options to compile templates coming from an untrusted source publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree gulp eslint eslint handlebars isminimumfixversionavailable true minimumfixversion handlebars basebranches vulnerabilityidentifier cve vulnerabilitydetails the package handlebars before are vulnerable to remote code execution rce when selecting certain compiling options to compile templates coming from an untrusted source vulnerabilityurl | 0 |
145,821 | 22,791,948,102 | IssuesEvent | 2022-07-10 06:00:05 | microsoft/fluentui | https://api.github.com/repos/microsoft/fluentui | closed | Screen reader is announcing incorrect information for SwatchColorPicker | Resolution: By Design Area: Narrator Component: SwatchColorPicker | ### Environment Information
- **Package version(s)**: ^8.15.1
- **Browser and OS versions**: Edge Version 98.0.1108.56 (Official build) (64-bit) / Windows 11
### Describe the issue:
Screen reader is announcing incorrect information as read only when focus navigates to colors buttons. Screen reader does not announce "not selected" and role as button for color element.
### Please provide a reproduction of the issue in a codepen:
On the documentation site, the example for "Simple swatch color picker with multiple rows and larger cells that updates its icon color and shows a preview color" demonstrates the issue:
https://codepen.io/pen?&prefill_data_id=2fa24b77-379e-4380-88d8-a0db6e42c5cd
1. Load Narrator.
2. Select a color swatch inside the example with multiple rows.
3. Notice that Narrator says the option is "read only".
4. Notice that Narrator does not says "Not selected" and role "button"
#### Actual behavior:
Screen reader is announcing incorrect information as read only when focus navigates to colors buttons. The observed issues were:
1. Incorrect information such as 'Read only' is announced for interactive elements.
2. State as 'Not Selected' not announced for not selected colors.
3. Also, Role is not announced as button for the color controls.
#### Expected behavior:
Screen reader should announce correct information when focus navigates to colors buttons. The expected behavior would be:
1. Incorrect information such as Read only should not be announced for interactive elements.
2. State as 'Not Selected' should be announced for not selected colors.
3. Also, Role should be defined and announced as button for the color controls.
### Documentation describing expected behavior
https://msfast.visualstudio.com/FAST%20Experiences/_workitems/edit/450078
| 1.0 | Screen reader is announcing incorrect information for SwatchColorPicker - ### Environment Information
- **Package version(s)**: ^8.15.1
- **Browser and OS versions**: Edge Version 98.0.1108.56 (Official build) (64-bit) / Windows 11
### Describe the issue:
Screen reader is announcing incorrect information as read only when focus navigates to colors buttons. Screen reader does not announce "not selected" and role as button for color element.
### Please provide a reproduction of the issue in a codepen:
On the documentation site, the example for "Simple swatch color picker with multiple rows and larger cells that updates its icon color and shows a preview color" demonstrates the issue:
https://codepen.io/pen?&prefill_data_id=2fa24b77-379e-4380-88d8-a0db6e42c5cd
1. Load Narrator.
2. Select a color swatch inside the example with multiple rows.
3. Notice that Narrator says the option is "read only".
4. Notice that Narrator does not says "Not selected" and role "button"
#### Actual behavior:
Screen reader is announcing incorrect information as read only when focus navigates to colors buttons. The observed issues were:
1. Incorrect information such as 'Read only' is announced for interactive elements.
2. State as 'Not Selected' not announced for not selected colors.
3. Also, Role is not announced as button for the color controls.
#### Expected behavior:
Screen reader should announce correct information when focus navigates to colors buttons. The expected behavior would be:
1. Incorrect information such as Read only should not be announced for interactive elements.
2. State as 'Not Selected' should be announced for not selected colors.
3. Also, Role should be defined and announced as button for the color controls.
### Documentation describing expected behavior
https://msfast.visualstudio.com/FAST%20Experiences/_workitems/edit/450078
| non_priority | screen reader is announcing incorrect information for swatchcolorpicker environment information package version s browser and os versions edge version official build bit windows describe the issue screen reader is announcing incorrect information as read only when focus navigates to colors buttons screen reader does not announce not selected and role as button for color element please provide a reproduction of the issue in a codepen on the documentation site the example for simple swatch color picker with multiple rows and larger cells that updates its icon color and shows a preview color demonstrates the issue load narrator select a color swatch inside the example with multiple rows notice that narrator says the option is read only notice that narrator does not says not selected and role button actual behavior screen reader is announcing incorrect information as read only when focus navigates to colors buttons the observed issues were incorrect information such as read only is announced for interactive elements state as not selected not announced for not selected colors also role is not announced as button for the color controls expected behavior screen reader should announce correct information when focus navigates to colors buttons the expected behavior would be incorrect information such as read only should not be announced for interactive elements state as not selected should be announced for not selected colors also role should be defined and announced as button for the color controls documentation describing expected behavior | 0 |
15,791 | 9,085,571,331 | IssuesEvent | 2019-02-18 08:43:07 | UnixJunkie/parany | https://api.github.com/repos/UnixJunkie/parany | closed | create a branch using serializers to/from int bigarray | feature-request performance prio-01 | less generic than using ancient
but still useful and probably easier to write/maintain
| True | create a branch using serializers to/from int bigarray - less generic than using ancient
but still useful and probably easier to write/maintain
| non_priority | create a branch using serializers to from int bigarray less generic than using ancient but still useful and probably easier to write maintain | 0 |
232,981 | 18,940,793,147 | IssuesEvent | 2021-11-18 02:25:44 | Tencent/bk-sops | https://api.github.com/repos/Tencent/bk-sops | closed | 【V3.10.0】变量的KEY字段不符合规范,点击保存按钮,会一直新增${} | type/test-stage-bug | 关键信息
=======
- [ ] bk-sops 版本:
- [ ]
重现方法
=======
<!-- 列出如何重现的方法或操作步骤 -->
新建变量->随意选择一个变量类型,如:输入框->在KEY字段输入不符合规范的值,如:test 01->点击保存按钮->KEY字段会一直新增${},如图所示

| 1.0 | 【V3.10.0】变量的KEY字段不符合规范,点击保存按钮,会一直新增${} - 关键信息
=======
- [ ] bk-sops 版本:
- [ ]
重现方法
=======
<!-- 列出如何重现的方法或操作步骤 -->
新建变量->随意选择一个变量类型,如:输入框->在KEY字段输入不符合规范的值,如:test 01->点击保存按钮->KEY字段会一直新增${},如图所示

| non_priority | 【 】变量的key字段不符合规范 点击保存按钮,会一直新增 关键信息 bk sops 版本: 重现方法 新建变量 随意选择一个变量类型,如:输入框 在key字段输入不符合规范的值,如:test 点击保存按钮 key字段会一直新增 ,如图所示 | 0 |
180,497 | 13,934,155,899 | IssuesEvent | 2020-10-22 09:39:02 | aio-libs/aiosmtpd | https://api.github.com/repos/aio-libs/aiosmtpd | closed | [FTBFS into debian] A test randomly fails. | testing | Dear developers,
Sometimes, the testing part of aiosmtpd fails, because of a specific test.
Here is, in that case, the error that occurs.
```
======================================================================
ERROR: test_debug_3 (aiosmtpd.tests.test_main.TestMain)
----------------------------------------------------------------------
Traceback (most recent call last):
File "/build/python-aiosmtpd-1.1/.pybuild/pythonX.Y_3.6/build/aiosmtpd/tests/test_main.py", line 140, in test_debug_3
main(('-n', '-ddd'))
File "/build/python-aiosmtpd-1.1/.pybuild/pythonX.Y_3.6/build/aiosmtpd/main.py", line 140, in main
loop.create_server(factory, host=args.host, port=args.port))
File "/usr/lib/python3.6/asyncio/base_events.py", line 465, in run_until_complete
raise RuntimeError('Event loop stopped before Future completed.')
RuntimeError: Event loop stopped before Future completed.
----------------------------------------------------------------------
```
This error does prevent aiosmtpd to build from source into debian, and so prevents the reproductibility tests to succeed.
Can you have a look at it please? | 1.0 | [FTBFS into debian] A test randomly fails. - Dear developers,
Sometimes, the testing part of aiosmtpd fails, because of a specific test.
Here is, in that case, the error that occurs.
```
======================================================================
ERROR: test_debug_3 (aiosmtpd.tests.test_main.TestMain)
----------------------------------------------------------------------
Traceback (most recent call last):
File "/build/python-aiosmtpd-1.1/.pybuild/pythonX.Y_3.6/build/aiosmtpd/tests/test_main.py", line 140, in test_debug_3
main(('-n', '-ddd'))
File "/build/python-aiosmtpd-1.1/.pybuild/pythonX.Y_3.6/build/aiosmtpd/main.py", line 140, in main
loop.create_server(factory, host=args.host, port=args.port))
File "/usr/lib/python3.6/asyncio/base_events.py", line 465, in run_until_complete
raise RuntimeError('Event loop stopped before Future completed.')
RuntimeError: Event loop stopped before Future completed.
----------------------------------------------------------------------
```
This error does prevent aiosmtpd to build from source into debian, and so prevents the reproductibility tests to succeed.
Can you have a look at it please? | non_priority | a test randomly fails dear developers sometimes the testing part of aiosmtpd fails because of a specific test here is in that case the error that occurs error test debug aiosmtpd tests test main testmain traceback most recent call last file build python aiosmtpd pybuild pythonx y build aiosmtpd tests test main py line in test debug main n ddd file build python aiosmtpd pybuild pythonx y build aiosmtpd main py line in main loop create server factory host args host port args port file usr lib asyncio base events py line in run until complete raise runtimeerror event loop stopped before future completed runtimeerror event loop stopped before future completed this error does prevent aiosmtpd to build from source into debian and so prevents the reproductibility tests to succeed can you have a look at it please | 0 |
49,134 | 7,477,827,873 | IssuesEvent | 2018-04-04 09:33:13 | terraform-providers/terraform-provider-azurerm | https://api.github.com/repos/terraform-providers/terraform-provider-azurerm | closed | App Service Plan resource documentation error | documentation service/app-service | How do I report an error in documentation? I am working on deploying an App Service Plan into and App Service Environment and the the documentation on the terraform.io website incorrectly states that if you are attaching an App Service Plan to an App Service Environment you must use the Premium SKU. It should read that it is required to use the Isolated SKU. | 1.0 | App Service Plan resource documentation error - How do I report an error in documentation? I am working on deploying an App Service Plan into and App Service Environment and the the documentation on the terraform.io website incorrectly states that if you are attaching an App Service Plan to an App Service Environment you must use the Premium SKU. It should read that it is required to use the Isolated SKU. | non_priority | app service plan resource documentation error how do i report an error in documentation i am working on deploying an app service plan into and app service environment and the the documentation on the terraform io website incorrectly states that if you are attaching an app service plan to an app service environment you must use the premium sku it should read that it is required to use the isolated sku | 0 |
7,509 | 18,067,784,262 | IssuesEvent | 2021-09-20 21:21:38 | CityOfDetroit/bloom | https://api.github.com/repos/CityOfDetroit/bloom | opened | Bulleted Unit Details / Amenities | epic: data architecture M13+ HRD Feedback | HRD requested easier-to-read bulleted list of Unit Details / Unit Amenities on the Listing Details view.
Note: Additional data parsing required. | 1.0 | Bulleted Unit Details / Amenities - HRD requested easier-to-read bulleted list of Unit Details / Unit Amenities on the Listing Details view.
Note: Additional data parsing required. | non_priority | bulleted unit details amenities hrd requested easier to read bulleted list of unit details unit amenities on the listing details view note additional data parsing required | 0 |
96,607 | 8,621,374,343 | IssuesEvent | 2018-11-20 17:10:34 | ubccapico/peer-review-averages | https://api.github.com/repos/ubccapico/peer-review-averages | reopened | Duplicate or old peer reviews | Ready for Testing bug enhancement | Script gets all peer reviews, regardless of them being the most updated ones for the current assignment or whether it's an older peer review from a previous assignment.
Need a way to separate old and new peer reviews. Or just extract latest peer reviews.
Problem can effect peer review averaging and cause errors. | 1.0 | Duplicate or old peer reviews - Script gets all peer reviews, regardless of them being the most updated ones for the current assignment or whether it's an older peer review from a previous assignment.
Need a way to separate old and new peer reviews. Or just extract latest peer reviews.
Problem can effect peer review averaging and cause errors. | non_priority | duplicate or old peer reviews script gets all peer reviews regardless of them being the most updated ones for the current assignment or whether it s an older peer review from a previous assignment need a way to separate old and new peer reviews or just extract latest peer reviews problem can effect peer review averaging and cause errors | 0 |
6,612 | 3,864,646,462 | IssuesEvent | 2016-04-08 14:37:24 | angular/angularfire2 | https://api.github.com/repos/angular/angularfire2 | closed | RFC: separate AngularFire service into multiple services to reflect Firebase platform better | comp: build/pipeline type: RFC / discussion / question | Firebase has multiple parts to it: Realtime Database, Authentication, Hosting (though hosting isn't really part of the AngularFire lib). As these parts are likely to grow in scope over time, it's good to think now about how to keep them separated in a way that's clear to users.
We currently have the `AngularFire` service concerned with data only, no auth (though it was planned that there'd be an `auth` property on `AngularFire`). Since some folks will not want to use both authentication and data in the same app, it would be advantageous to separate these scopes into separate top-level exports (what we commonly call "barrels" in angular-land).
I propose getting rid of the `AngularFire` service, and replace it with a `Data` service, and `Auth` service.
```typescript
import {AFData, FirebaseListObservable} from 'angularfire2/data';
import {AFAuth} from 'angularfire2/auth';
...
@Component({
template: `
<div *ngIf="afAuth | async">
Logged In
</div>
<div *ngIf="!(afAuth | async)">
Not Logged In
</div>
<ul>
<li *ngFor="#question of questions | async">
{{ question.title }}
</li>
</ul>
`
...
})
class Component {
questions: FirebaseListObservable<any[]>;
constructor(afData:AFData, public afAuth:AFAuth) {
this.questions = afData.list('/questions');
}
}
```
CC @davideast | 1.0 | RFC: separate AngularFire service into multiple services to reflect Firebase platform better - Firebase has multiple parts to it: Realtime Database, Authentication, Hosting (though hosting isn't really part of the AngularFire lib). As these parts are likely to grow in scope over time, it's good to think now about how to keep them separated in a way that's clear to users.
We currently have the `AngularFire` service concerned with data only, no auth (though it was planned that there'd be an `auth` property on `AngularFire`). Since some folks will not want to use both authentication and data in the same app, it would be advantageous to separate these scopes into separate top-level exports (what we commonly call "barrels" in angular-land).
I propose getting rid of the `AngularFire` service, and replace it with a `Data` service, and `Auth` service.
```typescript
import {AFData, FirebaseListObservable} from 'angularfire2/data';
import {AFAuth} from 'angularfire2/auth';
...
@Component({
template: `
<div *ngIf="afAuth | async">
Logged In
</div>
<div *ngIf="!(afAuth | async)">
Not Logged In
</div>
<ul>
<li *ngFor="#question of questions | async">
{{ question.title }}
</li>
</ul>
`
...
})
class Component {
questions: FirebaseListObservable<any[]>;
constructor(afData:AFData, public afAuth:AFAuth) {
this.questions = afData.list('/questions');
}
}
```
CC @davideast | non_priority | rfc separate angularfire service into multiple services to reflect firebase platform better firebase has multiple parts to it realtime database authentication hosting though hosting isn t really part of the angularfire lib as these parts are likely to grow in scope over time it s good to think now about how to keep them separated in a way that s clear to users we currently have the angularfire service concerned with data only no auth though it was planned that there d be an auth property on angularfire since some folks will not want to use both authentication and data in the same app it would be advantageous to separate these scopes into separate top level exports what we commonly call barrels in angular land i propose getting rid of the angularfire service and replace it with a data service and auth service typescript import afdata firebaselistobservable from data import afauth from auth component template logged in not logged in question title class component questions firebaselistobservable constructor afdata afdata public afauth afauth this questions afdata list questions cc davideast | 0 |
250,999 | 18,921,600,287 | IssuesEvent | 2021-11-17 02:48:32 | pavanramadass/-Entity-Traffic-Map | https://api.github.com/repos/pavanramadass/-Entity-Traffic-Map | closed | Project Details | documentation good first issue | - [x] Product Details
- [x] Language Details
- [x] Sprint Details
- [x] Team Details
- [x] #15 | 1.0 | Project Details - - [x] Product Details
- [x] Language Details
- [x] Sprint Details
- [x] Team Details
- [x] #15 | non_priority | project details product details language details sprint details team details | 0 |
226 | 2,562,544,231 | IssuesEvent | 2015-02-06 02:53:26 | TypeStrong/atom-typescript | https://api.github.com/repos/TypeStrong/atom-typescript | closed | Be Async | performance | Using the language service in the UI thread is slow. Solution : run it out of process.
Tasks:
* [x] hover tooltip
* [x] errors for files
* [x] Build
* [x] Use Promises not callbacks in UI thread (Atom comes with a version that has native `Promise`. If possible use that and make your code async.)
* [x] linter
* [x] autocomplete
| True | Be Async - Using the language service in the UI thread is slow. Solution : run it out of process.
Tasks:
* [x] hover tooltip
* [x] errors for files
* [x] Build
* [x] Use Promises not callbacks in UI thread (Atom comes with a version that has native `Promise`. If possible use that and make your code async.)
* [x] linter
* [x] autocomplete
| non_priority | be async using the language service in the ui thread is slow solution run it out of process tasks hover tooltip errors for files build use promises not callbacks in ui thread atom comes with a version that has native promise if possible use that and make your code async linter autocomplete | 0 |
1,189 | 2,601,756,427 | IssuesEvent | 2015-02-24 00:33:10 | chrsmith/bwapi | https://api.github.com/repos/chrsmith/bwapi | closed | getMinerals and getGeysers always return 0 | auto-migrated Type-Defect | ```
What steps will reproduce the problem?
1. use bwapi 3.1.1 beta
2. run exampleAIclient.exe (the one that came with bwapi)
3. launch singleplayer custom game "astral balance"
What is the expected output? What do you see instead?
i expect to see the workers harvesting minerals, but they just sit there.
after adding code to display the size of the returned mineral and geyser sets,
they show 0. Tried with complete map info, still no result. tried calling
bwapiclient::update about 5 times, then testing mineral count, still zero.
What version of the product are you using? On what operating system?
3.1.1 beta on W7P and XP Pro sp3.
Please provide any additional information below.
```
-----
Original issue reported on code.google.com by `dpershouse@gmail.com` on 21 Oct 2010 at 2:47 | 1.0 | getMinerals and getGeysers always return 0 - ```
What steps will reproduce the problem?
1. use bwapi 3.1.1 beta
2. run exampleAIclient.exe (the one that came with bwapi)
3. launch singleplayer custom game "astral balance"
What is the expected output? What do you see instead?
i expect to see the workers harvesting minerals, but they just sit there.
after adding code to display the size of the returned mineral and geyser sets,
they show 0. Tried with complete map info, still no result. tried calling
bwapiclient::update about 5 times, then testing mineral count, still zero.
What version of the product are you using? On what operating system?
3.1.1 beta on W7P and XP Pro sp3.
Please provide any additional information below.
```
-----
Original issue reported on code.google.com by `dpershouse@gmail.com` on 21 Oct 2010 at 2:47 | non_priority | getminerals and getgeysers always return what steps will reproduce the problem use bwapi beta run exampleaiclient exe the one that came with bwapi launch singleplayer custom game astral balance what is the expected output what do you see instead i expect to see the workers harvesting minerals but they just sit there after adding code to display the size of the returned mineral and geyser sets they show tried with complete map info still no result tried calling bwapiclient update about times then testing mineral count still zero what version of the product are you using on what operating system beta on and xp pro please provide any additional information below original issue reported on code google com by dpershouse gmail com on oct at | 0 |
84,825 | 10,566,406,803 | IssuesEvent | 2019-10-05 18:31:44 | cornell-dti/samwise | https://api.github.com/repos/cornell-dti/samwise | opened | "Last Day of Class" buttons need styling | bug design enhancement frontend good first issue | **Describe the bug**
The two buttons on the date picker when creating a new repeating task needs styling.
**To Reproduce**
Try to create a repeating task and set an end date
**Screenshots**

**Styles**
We don't have official designs yet, but just to get something going, model the buttons after the "specify time" button from this design on Zeplin for now:

| 1.0 | "Last Day of Class" buttons need styling - **Describe the bug**
The two buttons on the date picker when creating a new repeating task needs styling.
**To Reproduce**
Try to create a repeating task and set an end date
**Screenshots**

**Styles**
We don't have official designs yet, but just to get something going, model the buttons after the "specify time" button from this design on Zeplin for now:

| non_priority | last day of class buttons need styling describe the bug the two buttons on the date picker when creating a new repeating task needs styling to reproduce try to create a repeating task and set an end date screenshots styles we don t have official designs yet but just to get something going model the buttons after the specify time button from this design on zeplin for now | 0 |
9,714 | 11,768,584,189 | IssuesEvent | 2020-03-15 11:03:56 | presscustomizr/hueman | https://api.github.com/repos/presscustomizr/hueman | closed | [CSS] prefix .pad class more specifically to avoid potential conflic with plugins | enhancement plugin compatibility urgent | 
reported here : https://secure.helpscout.net/conversation/1103443166/220415?folderId=607547 | True | [CSS] prefix .pad class more specifically to avoid potential conflic with plugins - 
reported here : https://secure.helpscout.net/conversation/1103443166/220415?folderId=607547 | non_priority | prefix pad class more specifically to avoid potential conflic with plugins reported here | 0 |
24,035 | 16,762,842,266 | IssuesEvent | 2021-06-14 03:21:28 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | opened | Build failed: Validate-DotNet/main #runtime-94017-.NET6 | area-Infrastructure | Build [#runtime-94017-.NET6](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_build/results?buildId=1185537) failed
## :x: : internal / Validate-DotNet failed
### Summary
**Finished** - Mon, 14 Jun 2021 03:18:38 GMT
**Duration** - 253 minutes
**Requested for** - DotNet Bot
**Reason** - manual
### Details
#### Validation Ring
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - (NETCORE_ENGINEERING_TELEMETRY=CheckSymbols) Missing symbols for 5 modules in the package D:\workspace\_work\1\a\signed\shipping\assets\symbols\Microsoft.NETCore.App.Runtime.Mono.ios-arm.6.0.0-preview.6.21313.2.symbols.nupkg
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - (NETCORE_ENGINEERING_TELEMETRY=CheckSymbols) Missing symbols for 2 modules in the package D:\workspace\_work\1\a\signed\shipping\assets\symbols\Microsoft.NETCore.App.Runtime.win-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - (NETCORE_ENGINEERING_TELEMETRY=CheckSymbols) Missing symbols for 2 modules in the package D:\workspace\_work\1\a\signed\shipping\assets\symbols\Microsoft.NETCore.App.Runtime.win-arm.6.0.0-preview.6.21313.2.symbols.nupkg
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - (NETCORE_ENGINEERING_TELEMETRY=CheckSymbols) Symbols missing for 3/313 packages
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - PowerShell exited with code '1'.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/304) - ValidateSymbols: Entry found in generated contract does not match ValidateSymbols.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/304) - Steps were not validated for contract.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/304) - Contract was not validated.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/304) - PowerShell exited with code '1'.
#### Required Validation Ring
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/218) - Number of checksums and assets don't match. Checksums: 182. Assets: 796. Assets with no corresponding checksum are:
assets/symbols/System.Threading.Tasks.Dataflow.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Windows.Extensions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Configuration.ConfigurationManager.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.FileSystem.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Formats.Cbor.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Formats.Asn1.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Packaging.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Pipes.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Memory.Data.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Net.Http.Json.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Reflection.MetadataLoadContext.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Resources.Extensions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.Cryptography.Pkcs.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Runtime.CompilerServices.Unsafe.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.Cryptography.Xml.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Data.Odbc.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Text.Encodings.Web.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Diagnostics.DiagnosticSource.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Diagnostics.EventLog.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.ComponentModel.Composition.Registration.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.AttributedModel.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.Hosting.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.Extensions.Logging.Debug
Microsoft.Extensions.Logging.TraceSource
assets/symbols/System.Security.Principal.Windows.6.0.0-preview.6.21313.2.symbols.nupkg
Runtime/6.0.0-preview.6.21313.2/runtime-productVersion.txt
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.Win32.SystemEvents
Microsoft.Win32.Registry.AccessControl
Microsoft.NETCore.DotNetHostPolicy
Microsoft.NETCore.ILAsm
Microsoft.NETCore.ILDAsm
Microsoft.NETCore.DotNetHostResolver
runtime.osx-x64.Microsoft.NETCore.DotNetAppHost
runtime.osx-x64.Microsoft.NETCore.ILAsm
runtime.osx-x64.Microsoft.NETCore.DotNetHost
runtime.osx-x64.Microsoft.NETCore.DotNetHostPolicy
runtime.win-arm.Microsoft.NETCore.DotNetAppHost
runtime.osx-x64.Microsoft.NETCore.DotNetHostResolver
runtime.osx-x64.Microsoft.NETCore.ILDAsm
runtime.win-arm64.Microsoft.NETCore.DotNetAppHost
runtime.osx-x64.Microsoft.NETCore.TestHost
runtime.osx-x64.runtime.native.System.IO.Ports
runtime.win-arm.Microsoft.NETCore.DotNetHost
runtime.win-arm.Microsoft.NETCore.ILAsm
runtime.win-arm.Microsoft.NETCore.DotNetHostPolicy
runtime.win-arm.Microsoft.NETCore.DotNetHostResolver
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-arm64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-x64
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm64
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x64
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x86
Microsoft.NETCore.App.Runtime.linux-arm
Microsoft.NETCore.App.Runtime.linux-arm64
Microsoft.NETCore.App.Runtime.linux-musl-x64
Microsoft.NETCore.App.Runtime.Mono.android-arm64
Microsoft.NETCore.App.Runtime.Mono.android-x86
Microsoft.NETCore.App.Runtime.Mono.ios-arm64
Microsoft.NETCore.App.Crossgen2.linux-x64
Microsoft.NETCore.App.Runtime.linux-musl-arm
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm64
Microsoft.NETCore.App.Crossgen2.osx-x64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.browser-wasm
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x64
Microsoft.NETCore.App.Ref
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm64
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-musl-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.win-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.win-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.NETCore.App.Crossgen2.win-x86
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x64
assets/symbols/Microsoft.NETCore.App.PGO.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.browser-wasm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.browser-wasm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.WebAssembly.Sdk.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Sdk.IL.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Workload.Mono.ToolChain.Manifest-6.0.100.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-musl-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.win-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.BrowserDebugHost.Transport.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.tvos-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.android-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.android-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.browser-wasm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.iossimulator-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.iossimulator-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.ios-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.linux-musl-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.NETCore.App.Composite
Microsoft.Extensions.Options
Microsoft.Extensions.Options.ConfigurationExtensions
Microsoft.Extensions.Options.DataAnnotations
Microsoft.Extensions.Primitives
Microsoft.ILVerification
Microsoft.Extensions.Http
Microsoft.IO.Redist
Microsoft.Extensions.Configuration.CommandLine
Microsoft.Extensions.Configuration.EnvironmentVariables
Microsoft.NETCore.App.Crossgen2.linux-musl-x64
Microsoft.Extensions.Configuration.UserSecrets
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvos-arm64
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-arm64
Microsoft.NETCore.App.Runtime.Mono.android-x64
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x86
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.browser-wasm
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm
runtime.win-x86.Microsoft.NETCore.DotNetHostPolicy
assets/symbols/Microsoft.NETCore.App.Host.win-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Ref.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvos-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.osx-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.osx-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.win-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-musl-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.ios-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.maccatalyst-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Text.Encoding.CodePages.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.ServiceModel.Syndication.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.ServiceProcess.ServiceController.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Speech.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Text.Json.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Diagnostics.PerformanceCounter.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.DirectoryServices.Protocols.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Hashing.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Management.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Numerics.Tensors.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Reflection.Context.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Reflection.Metadata.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.TypedParts.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
runtime.linux-x64.runtime.native.System.IO.Ports
Microsoft.NETCore.App.Runtime.Mono.linux-musl-x64
runtime.native.System.IO.Ports
Microsoft.NETCore.App.Runtime.Mono.linux-arm64
runtime.osx-arm64.Microsoft.NETCore.DotNetHost
Microsoft.NETCore.App.Runtime.Mono.linux-arm
runtime.osx-arm64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-musl-x64.Microsoft.NETCore.TestHost
Microsoft.Extensions.Logging.Abstractions
Microsoft.Extensions.Logging
Microsoft.Extensions.Logging.Configuration
Microsoft.Extensions.Logging.Console
Microsoft.Extensions.Logging.EventLog
Microsoft.Extensions.Logging.EventSource
Microsoft.NET.Runtime.wasm.Sample.Mono
Microsoft.NETCore.App.Crossgen2.linux-musl-arm64
Microsoft.NET.Workload.Mono.ToolChain.Manifest-6.0.100
Microsoft.NETCore.App.Crossgen2.linux-musl-arm
Microsoft.Extensions.Hosting.WindowsServices
dotnet-ilverify
Microsoft.Extensions.Hosting.Abstractions
Microsoft.Diagnostics.Tracing.EventSource.Redist
Microsoft.NETCore.App.Crossgen2.osx-arm64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x86
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-arm64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-x64
Microsoft.NETCore.App.Runtime.linux-x64
Microsoft.NETCore.App.Runtime.Mono.android-arm
Microsoft.NETCore.App.Runtime.Mono.ios-arm
Microsoft.NETCore.App.Runtime.Mono.browser-wasm
Microsoft.NETCore.App.Runtime.Mono.iossimulator-arm64
Microsoft.NETCore.App.Crossgen2.win-arm64
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x86
runtime.win-x86.Microsoft.NETCore.DotNetAppHost
Microsoft.NETCore.App.Host.win-arm64
assets/symbols/runtime.linux-arm.runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.win-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.osx-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
runtime.win-x86.Microsoft.NETCore.DotNetHost
assets/symbols/Microsoft.NET.Runtime.Android.Sample.Mono.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.iOS.Sample.Mono.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.MonoAOTCompiler.Task.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.RuntimeConfigParser.Task.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.wasm.Sample.Mono.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.win-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-musl-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-musl-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-musl-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Private.CoreFx.OOB.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Win32.Registry.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Win32.Registry.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Win32.SystemEvents.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Windows.Compatibility.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.XmlSerializer.Generator.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-musl-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.android-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.maccatalyst-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.osx-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.linux-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
System.Memory.Data
System.Net.Http.WinHttpHandler
assets/symbols/Microsoft.IO.Redist.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Net.HostModel.PGO.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Primitives.6.0.0-preview.6.21313.2.symbols.nupkg
System.Net.Http.Json
System.Reflection.MetadataLoadContext
System.Numerics.Tensors
System.Reflection.Context
System.Resources.Extensions
System.Reflection.Metadata
System.Runtime.Caching
System.Runtime.CompilerServices.Unsafe
System.Security.AccessControl
runtime.win-x86.Microsoft.NETCore.TestHost
System.ComponentModel.Composition.Registration
System.Composition.Convention
System.Composition.AttributedModel
System.Composition
System.Data.Odbc
System.Composition.Hosting
System.Composition.TypedParts
System.Composition.Runtime
System.Data.OleDb
assets/symbols/Microsoft.ILVerification.6.0.0-preview.6.21313.2.symbols.nupkg
System.DirectoryServices
System.Formats.Cbor
System.IO.FileSystem.AccessControl
System.Configuration.ConfigurationManager
assets/symbols/Microsoft.Extensions.DependencyInjection.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.DependencyInjection.Specification.Tests.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.DependencyModel.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Hosting.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.Ini.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.Console.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.Debug.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.EventSource.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Options.DataAnnotations.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Hosting.Systemd.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.FileExtensions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.Json.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.AspNetCore.Internal.Transport.6.0.0-preview.6.21313.2.symbols.nupkg
Runtime/6.0.0-preview.6.21313.2/productVersion.txt
assets/symbols/runtime.linux-arm64.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-x64
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.win-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Composite.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.win-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.tvossimulator-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
System.Diagnostics.EventLog
System.Diagnostics.DiagnosticSource
System.Diagnostics.PerformanceCounter
System.DirectoryServices.AccountManagement
System.DirectoryServices.Protocols
System.Drawing.Common
assets/symbols/Microsoft.Extensions.Configuration.Binder.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/ILCompiler.Reflection.ReadyToRun.Experimental.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.CodeDom.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.ComponentModel.Composition.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.Convention.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.Runtime.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
runtime.linux-arm.Microsoft.NETCore.DotNetAppHost
Microsoft.XmlSerializer.Generator
Microsoft.Windows.Compatibility
runtime.linux-arm.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-arm.Microsoft.NETCore.DotNetHost
runtime.linux-arm.Microsoft.NETCore.ILAsm
runtime.linux-arm64.Microsoft.NETCore.DotNetAppHost
runtime.linux-arm.Microsoft.NETCore.DotNetHostResolver
runtime.linux-arm.Microsoft.NETCore.ILDAsm
runtime.linux-arm.Microsoft.NETCore.TestHost
runtime.linux-arm.runtime.native.System.IO.Ports
runtime.linux-arm64.Microsoft.NETCore.DotNetHost
runtime.linux-arm64.Microsoft.NETCore.ILAsm
runtime.linux-arm64.Microsoft.NETCore.DotNetHostResolver
runtime.linux-arm64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-arm64.Microsoft.NETCore.ILDAsm
runtime.linux-arm64.Microsoft.NETCore.TestHost
Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-arm64
runtime.linux-musl-arm.Microsoft.NETCore.DotNetAppHost
runtime.linux-musl-arm.Microsoft.NETCore.DotNetHostPolicy
Microsoft.NETCore.TestHost
Microsoft.NETCore.Platforms
Microsoft.NETCore.App.Runtime.Mono.maccatalyst-arm64
Microsoft.NETCore.App.Runtime.Mono.tvossimulator-x64
Microsoft.NETCore.App.Runtime.Mono.tvossimulator-arm64
Microsoft.NETCore.App.Runtime.Mono.osx-arm64
Microsoft.NETCore.App.Runtime.Mono.osx-x64
Microsoft.NETCore.App.Runtime.osx-x64
Microsoft.NETCore.App.Runtime.Mono.win-x64
runtime.linux-musl-arm.Microsoft.NETCore.ILAsm
Microsoft.NETCore.App.Runtime.win-x64
Microsoft.NETCore.App.Runtime.win-x86
Microsoft.NETCore.App.Runtime.Mono.win-x86
Microsoft.NETCore.DotNetAppHost
Microsoft.NETCore.DotNetHost
runtime.linux-musl-arm.Microsoft.NETCore.ILDAsm
runtime.linux-musl-arm.Microsoft.NETCore.TestHost
runtime.win-arm.Microsoft.NETCore.ILDAsm
runtime.osx-arm64.Microsoft.NETCore.TestHost
runtime.win-x64.Microsoft.NETCore.DotNetAppHost
runtime.win-arm64.Microsoft.NETCore.DotNetHost
runtime.win-arm64.Microsoft.NETCore.DotNetHostPolicy
runtime.win-arm64.Microsoft.NETCore.ILAsm
runtime.win-arm64.Microsoft.NETCore.DotNetHostResolver
runtime.win-arm64.Microsoft.NETCore.ILDAsm
runtime.win-arm64.Microsoft.NETCore.TestHost
Microsoft.NETCore.App.Runtime.Mono.linux-x64
runtime.win-x64.Microsoft.NETCore.DotNetHostPolicy
runtime.win-x64.Microsoft.NETCore.DotNetHost
runtime.win-x64.Microsoft.NETCore.DotNetHostResolver
runtime.win-x64.Microsoft.NETCore.ILAsm
Microsoft.NET.Runtime.iOS.Sample.Mono
Microsoft.NET.Runtime.Android.Sample.Mono
Microsoft.NET.Runtime.MonoAOTCompiler.Task
Microsoft.NET.Runtime.WebAssembly.Sdk
Microsoft.NET.Runtime.RuntimeConfigParser.Task
Microsoft.NETCore.App.Crossgen2.linux-arm64
Microsoft.NET.Sdk.IL
Microsoft.NETCore.App.Crossgen2.linux-arm
Microsoft.Bcl.AsyncInterfaces
Microsoft.Extensions.Caching.Memory
Microsoft.Extensions.Caching.Abstractions
Microsoft.Extensions.Configuration
Microsoft.Extensions.Configuration.Abstractions
Microsoft.Extensions.Configuration.Binder
Microsoft.Extensions.Configuration.FileExtensions
Microsoft.Extensions.Configuration.Json
Microsoft.Extensions.Hosting.Systemd
Microsoft.Extensions.DependencyInjection
Microsoft.Extensions.Configuration.Xml
Microsoft.Extensions.DependencyInjection.Specification.Tests
Microsoft.Extensions.DependencyInjection.Abstractions
Microsoft.Extensions.DependencyModel
Microsoft.Extensions.FileProviders.Abstractions
Microsoft.Extensions.FileProviders.Composite
Microsoft.Extensions.FileProviders.Physical
Microsoft.Extensions.Hosting
Microsoft.Extensions.FileSystemGlobbing
Microsoft.Extensions.Configuration.Ini
runtime.win-x64.Microsoft.NETCore.TestHost
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-musl-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.browser-wasm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.win-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.iossimulator-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
System.Management
System.Security.Cryptography.Pkcs
System.Security.Cryptography.ProtectedData
System.Security.Permissions
System.Security.Cryptography.Xml
System.Security.Principal.Windows
System.Text.Encoding.CodePages
System.ServiceModel.Syndication
System.Speech
System.ServiceProcess.ServiceController
System.Text.Json
System.Text.Encodings.Web
System.Threading.Tasks.Dataflow
System.Threading.AccessControl
System.Threading.Channels
System.IO.Pipes.AccessControl
System.IO.Ports
System.Windows.Extensions
System.IO.Pipelines
System.IO.Packaging
runtime.win-x86.Microsoft.NETCore.DotNetHostResolver
runtime.win-x86.Microsoft.NETCore.ILAsm
runtime.win-x86.Microsoft.NETCore.ILDAsm
System.CodeDom
System.Collections.Immutable
System.ComponentModel.Composition
System.Formats.Asn1
System.IO.Hashing
assets/symbols/Microsoft.Extensions.Configuration.UserSecrets.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.Xml.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.DependencyInjection.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.FileProviders.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.FileProviders.Composite.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.FileProviders.Physical.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.FileSystemGlobbing.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.HostFactoryResolver.Sources.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Hosting.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Hosting.WindowsServices.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Http.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.Configuration.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.EventLog.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.TraceSource.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Options.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Options.ConfigurationExtensions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.CommandLine.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Bcl.AsyncInterfaces.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Threading.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Threading.Channels.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.Permissions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.Cryptography.ProtectedData.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.DirectoryServices.AccountManagement.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.DirectoryServices.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Drawing.Common.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Pipelines.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Data.OleDb.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Net.Http.WinHttpHandler.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Runtime.Caching.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Collections.Immutable.6.0.0-preview.6.21313.2.symbols.nupkg
runtime.linux-arm64.runtime.native.System.IO.Ports
Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.osx-x64
runtime.linux-musl-arm.Microsoft.NETCore.DotNetHost
runtime.linux-musl-arm.Microsoft.NETCore.DotNetHostResolver
Microsoft.Win32.Registry
Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-arm64
Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-x64
Microsoft.NETCore.App.Runtime.Mono.LLVM.osx-x64
Microsoft.NETCore.App.Runtime.Mono.maccatalyst-x64
Microsoft.NETCore.App.Runtime.Mono.tvos-arm64
Microsoft.NETCore.App.Runtime.osx-arm64
Microsoft.NETCore.App.Runtime.win-arm
Microsoft.NETCore.App.Runtime.win-arm64
runtime.win-x64.Microsoft.NETCore.ILDAsm
runtime.win-arm.Microsoft.NETCore.TestHost
runtime.linux-musl-arm64.Microsoft.NETCore.DotNetAppHost
runtime.osx-arm64.Microsoft.NETCore.DotNetHostResolver
runtime.osx-arm64.Microsoft.NETCore.ILDAsm
runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHost
runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHostResolver
runtime.linux-musl-arm64.Microsoft.NETCore.ILAsm
runtime.linux-musl-x64.Microsoft.NETCore.DotNetAppHost
runtime.linux-musl-arm64.Microsoft.NETCore.ILDAsm
runtime.linux-musl-arm64.Microsoft.NETCore.TestHost
runtime.linux-musl-x64.Microsoft.NETCore.DotNetHost
runtime.linux-musl-x64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-musl-x64.Microsoft.NETCore.ILAsm
runtime.linux-musl-x64.Microsoft.NETCore.DotNetHostResolver
runtime.linux-x64.Microsoft.NETCore.DotNetAppHost
runtime.osx-arm64.Microsoft.NETCore.ILAsm
runtime.linux-musl-x64.Microsoft.NETCore.ILDAsm
runtime.linux-x64.Microsoft.NETCore.DotNetHost
runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver
runtime.linux-x64.Microsoft.NETCore.ILAsm
runtime.linux-x64.Microsoft.NETCore.ILDAsm
runtime.osx-arm64.Microsoft.NETCore.DotNetAppHost
runtime.linux-x64.Microsoft.NETCore.TestHost
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.browser-wasm
Microsoft.NETCore.App.Runtime.linux-musl-arm64
Microsoft.NETCore.App.Runtime.Mono.iossimulator-x64
Microsoft.NETCore.App.Runtime.Mono.iossimulator-x86
Microsoft.NETCore.App.Crossgen2.win-arm
Microsoft.NETCore.App.Crossgen2.win-x64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm
Microsoft.NETCore.App.Host.linux-arm
Microsoft.NETCore.App.Host.linux-musl-arm
Microsoft.NETCore.App.Host.linux-arm64
Microsoft.NETCore.App.Host.linux-musl-arm64
Microsoft.NETCore.App.Host.linux-x64
Microsoft.NETCore.App.Host.linux-musl-x64
Microsoft.NETCore.App.Host.osx-x64
Microsoft.NETCore.App.Host.osx-arm64
Microsoft.NETCore.App.Host.win-x64
Microsoft.NETCore.App.Host.win-arm
Microsoft.NETCore.App.Host.win-x86
assets/symbols/Microsoft.NETCore.App.Host.win-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.win-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.win-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.win-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.HostModel.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-musl-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.android-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.tvossimulator-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.EnvironmentVariables.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Diagnostics.Tracing.EventSource.Redist.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Caching.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Caching.Memory.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/dotnet-pgo.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/dotnet-ilverify.6.0.0-preview.6.21313.2.symbols.nupkg
#### Source Code Validation
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/119) - ValidateLoc-*: Could not find matching entry in generated contract.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/119) - Steps were not validated for contract.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/119) - Contract was not validated.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/119) - PowerShell exited with code '1'.
### Changes
- [8ab94f83](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/8ab94f8338ca99ce58e75f8921897a6dd5f311db) - Lee Coward - Merged PR 15725: add cbl_mariner to rpm repo list
- [3c1f6c7d](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/3c1f6c7d379568f6ae87cf5b06ca207b74069ac7) - Lee Coward - add cbl_mariner to rpm repo list
- [cdf1ccae](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/cdf1ccaebd4ee8c1295abca746840897d81e23d3) - Lee Coward - Merged PR 15655: add cbl mariner runtime deps installer
- [94e1d7a9](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/94e1d7a922092366346345bb0827efca1e9f82f7) - Michelle McDaniel - Merged PR 15579: Merge production -> main
- [0444bd8f](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/0444bd8f45625095b2cd40002812119da88e588b) - Michelle McDaniel - Merged PR 15680: Fix config file usage in Fast Insertion pipeline
- [0ec52935](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/0ec529355b244a2b498d7d8cd2cf26e3f80d5569) - Lee Coward - add cbl mariner runtime deps installer
- [0da6993a](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/0da6993a9389d4b0f9b7dc619d7be683e2505a01) - Michelle McDaniel - Merged PR 15567: Publish the signed mac and linux files to staging locations
- [3c34e90c](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/3c34e90cc07c5f88222ebebc4dda78e23a548e94) - Alex Svyatenkiy - Merged PR 15578: fixes to Release pipelines
- [819d3008](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/819d3008249bcc35576e9f4672a784e7a11a348b) - AlexSvyat - one more dependency
- [4c07359e](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/4c07359e1b2dd33016896aabd9d94425f9d29ff7) - Michelle McDaniel - Merged PR 15577: Fix releaseDate logic
| 1.0 | Build failed: Validate-DotNet/main #runtime-94017-.NET6 - Build [#runtime-94017-.NET6](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_build/results?buildId=1185537) failed
## :x: : internal / Validate-DotNet failed
### Summary
**Finished** - Mon, 14 Jun 2021 03:18:38 GMT
**Duration** - 253 minutes
**Requested for** - DotNet Bot
**Reason** - manual
### Details
#### Validation Ring
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - (NETCORE_ENGINEERING_TELEMETRY=CheckSymbols) Missing symbols for 5 modules in the package D:\workspace\_work\1\a\signed\shipping\assets\symbols\Microsoft.NETCore.App.Runtime.Mono.ios-arm.6.0.0-preview.6.21313.2.symbols.nupkg
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - (NETCORE_ENGINEERING_TELEMETRY=CheckSymbols) Missing symbols for 2 modules in the package D:\workspace\_work\1\a\signed\shipping\assets\symbols\Microsoft.NETCore.App.Runtime.win-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - (NETCORE_ENGINEERING_TELEMETRY=CheckSymbols) Missing symbols for 2 modules in the package D:\workspace\_work\1\a\signed\shipping\assets\symbols\Microsoft.NETCore.App.Runtime.win-arm.6.0.0-preview.6.21313.2.symbols.nupkg
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - (NETCORE_ENGINEERING_TELEMETRY=CheckSymbols) Symbols missing for 3/313 packages
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/281) - PowerShell exited with code '1'.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/304) - ValidateSymbols: Entry found in generated contract does not match ValidateSymbols.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/304) - Steps were not validated for contract.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/304) - Contract was not validated.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/304) - PowerShell exited with code '1'.
#### Required Validation Ring
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/218) - Number of checksums and assets don't match. Checksums: 182. Assets: 796. Assets with no corresponding checksum are:
assets/symbols/System.Threading.Tasks.Dataflow.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Windows.Extensions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Configuration.ConfigurationManager.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.FileSystem.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Formats.Cbor.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Formats.Asn1.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Packaging.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Pipes.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Memory.Data.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Net.Http.Json.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Reflection.MetadataLoadContext.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Resources.Extensions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.Cryptography.Pkcs.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Runtime.CompilerServices.Unsafe.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.Cryptography.Xml.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Data.Odbc.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Text.Encodings.Web.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Diagnostics.DiagnosticSource.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Diagnostics.EventLog.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.ComponentModel.Composition.Registration.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.AttributedModel.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.Hosting.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.Extensions.Logging.Debug
Microsoft.Extensions.Logging.TraceSource
assets/symbols/System.Security.Principal.Windows.6.0.0-preview.6.21313.2.symbols.nupkg
Runtime/6.0.0-preview.6.21313.2/runtime-productVersion.txt
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.Win32.SystemEvents
Microsoft.Win32.Registry.AccessControl
Microsoft.NETCore.DotNetHostPolicy
Microsoft.NETCore.ILAsm
Microsoft.NETCore.ILDAsm
Microsoft.NETCore.DotNetHostResolver
runtime.osx-x64.Microsoft.NETCore.DotNetAppHost
runtime.osx-x64.Microsoft.NETCore.ILAsm
runtime.osx-x64.Microsoft.NETCore.DotNetHost
runtime.osx-x64.Microsoft.NETCore.DotNetHostPolicy
runtime.win-arm.Microsoft.NETCore.DotNetAppHost
runtime.osx-x64.Microsoft.NETCore.DotNetHostResolver
runtime.osx-x64.Microsoft.NETCore.ILDAsm
runtime.win-arm64.Microsoft.NETCore.DotNetAppHost
runtime.osx-x64.Microsoft.NETCore.TestHost
runtime.osx-x64.runtime.native.System.IO.Ports
runtime.win-arm.Microsoft.NETCore.DotNetHost
runtime.win-arm.Microsoft.NETCore.ILAsm
runtime.win-arm.Microsoft.NETCore.DotNetHostPolicy
runtime.win-arm.Microsoft.NETCore.DotNetHostResolver
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-arm64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-x64
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm64
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x64
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x86
Microsoft.NETCore.App.Runtime.linux-arm
Microsoft.NETCore.App.Runtime.linux-arm64
Microsoft.NETCore.App.Runtime.linux-musl-x64
Microsoft.NETCore.App.Runtime.Mono.android-arm64
Microsoft.NETCore.App.Runtime.Mono.android-x86
Microsoft.NETCore.App.Runtime.Mono.ios-arm64
Microsoft.NETCore.App.Crossgen2.linux-x64
Microsoft.NETCore.App.Runtime.linux-musl-arm
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm64
Microsoft.NETCore.App.Crossgen2.osx-x64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.browser-wasm
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x64
Microsoft.NETCore.App.Ref
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm64
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-musl-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.win-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.win-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.NETCore.App.Crossgen2.win-x86
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x64
assets/symbols/Microsoft.NETCore.App.PGO.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.browser-wasm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.browser-wasm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.WebAssembly.Sdk.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Sdk.IL.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Workload.Mono.ToolChain.Manifest-6.0.100.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-musl-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.win-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.BrowserDebugHost.Transport.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.tvos-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.android-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.android-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.browser-wasm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.iossimulator-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.iossimulator-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.ios-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.linux-musl-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.NETCore.App.Composite
Microsoft.Extensions.Options
Microsoft.Extensions.Options.ConfigurationExtensions
Microsoft.Extensions.Options.DataAnnotations
Microsoft.Extensions.Primitives
Microsoft.ILVerification
Microsoft.Extensions.Http
Microsoft.IO.Redist
Microsoft.Extensions.Configuration.CommandLine
Microsoft.Extensions.Configuration.EnvironmentVariables
Microsoft.NETCore.App.Crossgen2.linux-musl-x64
Microsoft.Extensions.Configuration.UserSecrets
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvos-arm64
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-arm64
Microsoft.NETCore.App.Runtime.Mono.android-x64
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x86
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.browser-wasm
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm
runtime.win-x86.Microsoft.NETCore.DotNetHostPolicy
assets/symbols/Microsoft.NETCore.App.Host.win-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Ref.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvos-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.osx-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.osx-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.win-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-musl-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.ios-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.maccatalyst-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Text.Encoding.CodePages.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.ServiceModel.Syndication.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.ServiceProcess.ServiceController.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Speech.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Text.Json.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-arm64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.osx-x64.runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-x64.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Diagnostics.PerformanceCounter.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.DirectoryServices.Protocols.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Hashing.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Management.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Numerics.Tensors.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Reflection.Context.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Reflection.Metadata.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.TypedParts.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
runtime.linux-x64.runtime.native.System.IO.Ports
Microsoft.NETCore.App.Runtime.Mono.linux-musl-x64
runtime.native.System.IO.Ports
Microsoft.NETCore.App.Runtime.Mono.linux-arm64
runtime.osx-arm64.Microsoft.NETCore.DotNetHost
Microsoft.NETCore.App.Runtime.Mono.linux-arm
runtime.osx-arm64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-musl-x64.Microsoft.NETCore.TestHost
Microsoft.Extensions.Logging.Abstractions
Microsoft.Extensions.Logging
Microsoft.Extensions.Logging.Configuration
Microsoft.Extensions.Logging.Console
Microsoft.Extensions.Logging.EventLog
Microsoft.Extensions.Logging.EventSource
Microsoft.NET.Runtime.wasm.Sample.Mono
Microsoft.NETCore.App.Crossgen2.linux-musl-arm64
Microsoft.NET.Workload.Mono.ToolChain.Manifest-6.0.100
Microsoft.NETCore.App.Crossgen2.linux-musl-arm
Microsoft.Extensions.Hosting.WindowsServices
dotnet-ilverify
Microsoft.Extensions.Hosting.Abstractions
Microsoft.Diagnostics.Tracing.EventSource.Redist
Microsoft.NETCore.App.Crossgen2.osx-arm64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x86
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-arm64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-x64
Microsoft.NETCore.App.Runtime.linux-x64
Microsoft.NETCore.App.Runtime.Mono.android-arm
Microsoft.NETCore.App.Runtime.Mono.ios-arm
Microsoft.NETCore.App.Runtime.Mono.browser-wasm
Microsoft.NETCore.App.Runtime.Mono.iossimulator-arm64
Microsoft.NETCore.App.Crossgen2.win-arm64
Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x86
runtime.win-x86.Microsoft.NETCore.DotNetAppHost
Microsoft.NETCore.App.Host.win-arm64
assets/symbols/runtime.linux-arm.runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.win-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.osx-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
runtime.win-x86.Microsoft.NETCore.DotNetHost
assets/symbols/Microsoft.NET.Runtime.Android.Sample.Mono.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.iOS.Sample.Mono.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.MonoAOTCompiler.Task.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.RuntimeConfigParser.Task.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.Runtime.wasm.Sample.Mono.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.win-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-musl-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-musl-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-musl-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Private.CoreFx.OOB.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Win32.Registry.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Win32.Registry.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Win32.SystemEvents.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Windows.Compatibility.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.XmlSerializer.Generator.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-musl-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.android-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.maccatalyst-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.osx-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.linux-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
System.Memory.Data
System.Net.Http.WinHttpHandler
assets/symbols/Microsoft.IO.Redist.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Net.HostModel.PGO.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Primitives.6.0.0-preview.6.21313.2.symbols.nupkg
System.Net.Http.Json
System.Reflection.MetadataLoadContext
System.Numerics.Tensors
System.Reflection.Context
System.Resources.Extensions
System.Reflection.Metadata
System.Runtime.Caching
System.Runtime.CompilerServices.Unsafe
System.Security.AccessControl
runtime.win-x86.Microsoft.NETCore.TestHost
System.ComponentModel.Composition.Registration
System.Composition.Convention
System.Composition.AttributedModel
System.Composition
System.Data.Odbc
System.Composition.Hosting
System.Composition.TypedParts
System.Composition.Runtime
System.Data.OleDb
assets/symbols/Microsoft.ILVerification.6.0.0-preview.6.21313.2.symbols.nupkg
System.DirectoryServices
System.Formats.Cbor
System.IO.FileSystem.AccessControl
System.Configuration.ConfigurationManager
assets/symbols/Microsoft.Extensions.DependencyInjection.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.DependencyInjection.Specification.Tests.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.DependencyModel.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Hosting.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.Ini.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.Console.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.Debug.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.EventSource.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Options.DataAnnotations.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Hosting.Systemd.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.FileExtensions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.Json.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.AspNetCore.Internal.Transport.6.0.0-preview.6.21313.2.symbols.nupkg
Runtime/6.0.0-preview.6.21313.2/productVersion.txt
assets/symbols/runtime.linux-arm64.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-x64
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Host.win-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Composite.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.win-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.tvossimulator-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.osx-x64.6.0.0-preview.6.21313.2.symbols.nupkg
System.Diagnostics.EventLog
System.Diagnostics.DiagnosticSource
System.Diagnostics.PerformanceCounter
System.DirectoryServices.AccountManagement
System.DirectoryServices.Protocols
System.Drawing.Common
assets/symbols/Microsoft.Extensions.Configuration.Binder.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/ILCompiler.Reflection.ReadyToRun.Experimental.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.CodeDom.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.ComponentModel.Composition.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.Convention.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Composition.Runtime.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
runtime.linux-arm.Microsoft.NETCore.DotNetAppHost
Microsoft.XmlSerializer.Generator
Microsoft.Windows.Compatibility
runtime.linux-arm.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-arm.Microsoft.NETCore.DotNetHost
runtime.linux-arm.Microsoft.NETCore.ILAsm
runtime.linux-arm64.Microsoft.NETCore.DotNetAppHost
runtime.linux-arm.Microsoft.NETCore.DotNetHostResolver
runtime.linux-arm.Microsoft.NETCore.ILDAsm
runtime.linux-arm.Microsoft.NETCore.TestHost
runtime.linux-arm.runtime.native.System.IO.Ports
runtime.linux-arm64.Microsoft.NETCore.DotNetHost
runtime.linux-arm64.Microsoft.NETCore.ILAsm
runtime.linux-arm64.Microsoft.NETCore.DotNetHostResolver
runtime.linux-arm64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-arm64.Microsoft.NETCore.ILDAsm
runtime.linux-arm64.Microsoft.NETCore.TestHost
Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-arm64
runtime.linux-musl-arm.Microsoft.NETCore.DotNetAppHost
runtime.linux-musl-arm.Microsoft.NETCore.DotNetHostPolicy
Microsoft.NETCore.TestHost
Microsoft.NETCore.Platforms
Microsoft.NETCore.App.Runtime.Mono.maccatalyst-arm64
Microsoft.NETCore.App.Runtime.Mono.tvossimulator-x64
Microsoft.NETCore.App.Runtime.Mono.tvossimulator-arm64
Microsoft.NETCore.App.Runtime.Mono.osx-arm64
Microsoft.NETCore.App.Runtime.Mono.osx-x64
Microsoft.NETCore.App.Runtime.osx-x64
Microsoft.NETCore.App.Runtime.Mono.win-x64
runtime.linux-musl-arm.Microsoft.NETCore.ILAsm
Microsoft.NETCore.App.Runtime.win-x64
Microsoft.NETCore.App.Runtime.win-x86
Microsoft.NETCore.App.Runtime.Mono.win-x86
Microsoft.NETCore.DotNetAppHost
Microsoft.NETCore.DotNetHost
runtime.linux-musl-arm.Microsoft.NETCore.ILDAsm
runtime.linux-musl-arm.Microsoft.NETCore.TestHost
runtime.win-arm.Microsoft.NETCore.ILDAsm
runtime.osx-arm64.Microsoft.NETCore.TestHost
runtime.win-x64.Microsoft.NETCore.DotNetAppHost
runtime.win-arm64.Microsoft.NETCore.DotNetHost
runtime.win-arm64.Microsoft.NETCore.DotNetHostPolicy
runtime.win-arm64.Microsoft.NETCore.ILAsm
runtime.win-arm64.Microsoft.NETCore.DotNetHostResolver
runtime.win-arm64.Microsoft.NETCore.ILDAsm
runtime.win-arm64.Microsoft.NETCore.TestHost
Microsoft.NETCore.App.Runtime.Mono.linux-x64
runtime.win-x64.Microsoft.NETCore.DotNetHostPolicy
runtime.win-x64.Microsoft.NETCore.DotNetHost
runtime.win-x64.Microsoft.NETCore.DotNetHostResolver
runtime.win-x64.Microsoft.NETCore.ILAsm
Microsoft.NET.Runtime.iOS.Sample.Mono
Microsoft.NET.Runtime.Android.Sample.Mono
Microsoft.NET.Runtime.MonoAOTCompiler.Task
Microsoft.NET.Runtime.WebAssembly.Sdk
Microsoft.NET.Runtime.RuntimeConfigParser.Task
Microsoft.NETCore.App.Crossgen2.linux-arm64
Microsoft.NET.Sdk.IL
Microsoft.NETCore.App.Crossgen2.linux-arm
Microsoft.Bcl.AsyncInterfaces
Microsoft.Extensions.Caching.Memory
Microsoft.Extensions.Caching.Abstractions
Microsoft.Extensions.Configuration
Microsoft.Extensions.Configuration.Abstractions
Microsoft.Extensions.Configuration.Binder
Microsoft.Extensions.Configuration.FileExtensions
Microsoft.Extensions.Configuration.Json
Microsoft.Extensions.Hosting.Systemd
Microsoft.Extensions.DependencyInjection
Microsoft.Extensions.Configuration.Xml
Microsoft.Extensions.DependencyInjection.Specification.Tests
Microsoft.Extensions.DependencyInjection.Abstractions
Microsoft.Extensions.DependencyModel
Microsoft.Extensions.FileProviders.Abstractions
Microsoft.Extensions.FileProviders.Composite
Microsoft.Extensions.FileProviders.Physical
Microsoft.Extensions.Hosting
Microsoft.Extensions.FileSystemGlobbing
Microsoft.Extensions.Configuration.Ini
runtime.win-x64.Microsoft.NETCore.TestHost
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-musl-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.browser-wasm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.win-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.iossimulator-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
System.Management
System.Security.Cryptography.Pkcs
System.Security.Cryptography.ProtectedData
System.Security.Permissions
System.Security.Cryptography.Xml
System.Security.Principal.Windows
System.Text.Encoding.CodePages
System.ServiceModel.Syndication
System.Speech
System.ServiceProcess.ServiceController
System.Text.Json
System.Text.Encodings.Web
System.Threading.Tasks.Dataflow
System.Threading.AccessControl
System.Threading.Channels
System.IO.Pipes.AccessControl
System.IO.Ports
System.Windows.Extensions
System.IO.Pipelines
System.IO.Packaging
runtime.win-x86.Microsoft.NETCore.DotNetHostResolver
runtime.win-x86.Microsoft.NETCore.ILAsm
runtime.win-x86.Microsoft.NETCore.ILDAsm
System.CodeDom
System.Collections.Immutable
System.ComponentModel.Composition
System.Formats.Asn1
System.IO.Hashing
assets/symbols/Microsoft.Extensions.Configuration.UserSecrets.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.Xml.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.DependencyInjection.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.FileProviders.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.FileProviders.Composite.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.FileProviders.Physical.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.FileSystemGlobbing.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.HostFactoryResolver.Sources.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Hosting.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Hosting.WindowsServices.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Http.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.Configuration.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.EventLog.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Logging.TraceSource.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Options.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Options.ConfigurationExtensions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.CommandLine.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Bcl.AsyncInterfaces.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.ILAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Threading.AccessControl.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Threading.Channels.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.Permissions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Security.Cryptography.ProtectedData.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.DotNetAppHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-arm64.runtime.native.System.IO.Ports.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.DotNetHostPolicy.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.DotNetHostResolver.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.ILDAsm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-arm64.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.linux-musl-x64.Microsoft.CrossOsDiag.Private.CoreCLR.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-arm.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.DirectoryServices.AccountManagement.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.DirectoryServices.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Drawing.Common.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.IO.Pipelines.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Data.OleDb.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Net.Http.WinHttpHandler.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Runtime.Caching.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.DotNetHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/runtime.win-x86.Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/System.Collections.Immutable.6.0.0-preview.6.21313.2.symbols.nupkg
runtime.linux-arm64.runtime.native.System.IO.Ports
Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.osx-x64
runtime.linux-musl-arm.Microsoft.NETCore.DotNetHost
runtime.linux-musl-arm.Microsoft.NETCore.DotNetHostResolver
Microsoft.Win32.Registry
Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-arm64
Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-x64
Microsoft.NETCore.App.Runtime.Mono.LLVM.osx-x64
Microsoft.NETCore.App.Runtime.Mono.maccatalyst-x64
Microsoft.NETCore.App.Runtime.Mono.tvos-arm64
Microsoft.NETCore.App.Runtime.osx-arm64
Microsoft.NETCore.App.Runtime.win-arm
Microsoft.NETCore.App.Runtime.win-arm64
runtime.win-x64.Microsoft.NETCore.ILDAsm
runtime.win-arm.Microsoft.NETCore.TestHost
runtime.linux-musl-arm64.Microsoft.NETCore.DotNetAppHost
runtime.osx-arm64.Microsoft.NETCore.DotNetHostResolver
runtime.osx-arm64.Microsoft.NETCore.ILDAsm
runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHost
runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-musl-arm64.Microsoft.NETCore.DotNetHostResolver
runtime.linux-musl-arm64.Microsoft.NETCore.ILAsm
runtime.linux-musl-x64.Microsoft.NETCore.DotNetAppHost
runtime.linux-musl-arm64.Microsoft.NETCore.ILDAsm
runtime.linux-musl-arm64.Microsoft.NETCore.TestHost
runtime.linux-musl-x64.Microsoft.NETCore.DotNetHost
runtime.linux-musl-x64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-musl-x64.Microsoft.NETCore.ILAsm
runtime.linux-musl-x64.Microsoft.NETCore.DotNetHostResolver
runtime.linux-x64.Microsoft.NETCore.DotNetAppHost
runtime.osx-arm64.Microsoft.NETCore.ILAsm
runtime.linux-musl-x64.Microsoft.NETCore.ILDAsm
runtime.linux-x64.Microsoft.NETCore.DotNetHost
runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy
runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver
runtime.linux-x64.Microsoft.NETCore.ILAsm
runtime.linux-x64.Microsoft.NETCore.ILDAsm
runtime.osx-arm64.Microsoft.NETCore.DotNetAppHost
runtime.linux-x64.Microsoft.NETCore.TestHost
Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.browser-wasm
Microsoft.NETCore.App.Runtime.linux-musl-arm64
Microsoft.NETCore.App.Runtime.Mono.iossimulator-x64
Microsoft.NETCore.App.Runtime.Mono.iossimulator-x86
Microsoft.NETCore.App.Crossgen2.win-arm
Microsoft.NETCore.App.Crossgen2.win-x64
Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm
Microsoft.NETCore.App.Host.linux-arm
Microsoft.NETCore.App.Host.linux-musl-arm
Microsoft.NETCore.App.Host.linux-arm64
Microsoft.NETCore.App.Host.linux-musl-arm64
Microsoft.NETCore.App.Host.linux-x64
Microsoft.NETCore.App.Host.linux-musl-x64
Microsoft.NETCore.App.Host.osx-x64
Microsoft.NETCore.App.Host.osx-arm64
Microsoft.NETCore.App.Host.win-x64
Microsoft.NETCore.App.Host.win-arm
Microsoft.NETCore.App.Host.win-x86
assets/symbols/Microsoft.NETCore.App.Host.win-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.linux-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Crossgen2.win-x64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.win-x86.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.win-arm.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.TestHost.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NET.HostModel.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.linux-musl-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.android-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.tvossimulator-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-arm64.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Configuration.EnvironmentVariables.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Diagnostics.Tracing.EventSource.Redist.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Caching.Abstractions.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/Microsoft.Extensions.Caching.Memory.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/dotnet-pgo.6.0.0-preview.6.21313.2.symbols.nupkg
assets/symbols/dotnet-ilverify.6.0.0-preview.6.21313.2.symbols.nupkg
#### Source Code Validation
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/119) - ValidateLoc-*: Could not find matching entry in generated contract.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/119) - Steps were not validated for contract.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/119) - Contract was not validated.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/1185537/logs/119) - PowerShell exited with code '1'.
### Changes
- [8ab94f83](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/8ab94f8338ca99ce58e75f8921897a6dd5f311db) - Lee Coward - Merged PR 15725: add cbl_mariner to rpm repo list
- [3c1f6c7d](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/3c1f6c7d379568f6ae87cf5b06ca207b74069ac7) - Lee Coward - add cbl_mariner to rpm repo list
- [cdf1ccae](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/cdf1ccaebd4ee8c1295abca746840897d81e23d3) - Lee Coward - Merged PR 15655: add cbl mariner runtime deps installer
- [94e1d7a9](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/94e1d7a922092366346345bb0827efca1e9f82f7) - Michelle McDaniel - Merged PR 15579: Merge production -> main
- [0444bd8f](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/0444bd8f45625095b2cd40002812119da88e588b) - Michelle McDaniel - Merged PR 15680: Fix config file usage in Fast Insertion pipeline
- [0ec52935](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/0ec529355b244a2b498d7d8cd2cf26e3f80d5569) - Lee Coward - add cbl mariner runtime deps installer
- [0da6993a](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/0da6993a9389d4b0f9b7dc619d7be683e2505a01) - Michelle McDaniel - Merged PR 15567: Publish the signed mac and linux files to staging locations
- [3c34e90c](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/3c34e90cc07c5f88222ebebc4dda78e23a548e94) - Alex Svyatenkiy - Merged PR 15578: fixes to Release pipelines
- [819d3008](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/819d3008249bcc35576e9f4672a784e7a11a348b) - AlexSvyat - one more dependency
- [4c07359e](https://dev.azure.com/dnceng/internal/_git/dotnet-release/commit/4c07359e1b2dd33016896aabd9d94425f9d29ff7) - Michelle McDaniel - Merged PR 15577: Fix releaseDate logic
| non_priority | build failed validate dotnet main runtime build failed x internal validate dotnet failed summary finished mon jun gmt duration minutes requested for dotnet bot reason manual details validation ring x netcore engineering telemetry checksymbols missing symbols for modules in the package d workspace work a signed shipping assets symbols microsoft netcore app runtime mono ios arm preview symbols nupkg x netcore engineering telemetry checksymbols missing symbols for modules in the package d workspace work a signed shipping assets symbols microsoft netcore app runtime win preview symbols nupkg x netcore engineering telemetry checksymbols missing symbols for modules in the package d workspace work a signed shipping assets symbols microsoft netcore app runtime win arm preview symbols nupkg x netcore engineering telemetry checksymbols symbols missing for packages x powershell exited with code x validatesymbols entry found in generated contract does not match validatesymbols x steps were not validated for contract x contract was not validated x powershell exited with code required validation ring warning number of checksums and assets don t match checksums assets assets with no corresponding checksum are assets symbols system threading tasks dataflow preview symbols nupkg assets symbols system windows extensions preview symbols nupkg assets symbols runtime osx microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime linux microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime linux musl microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime win microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime win microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime win microsoft netcore ilasm preview symbols nupkg assets symbols runtime win microsoft netcore ildasm preview symbols nupkg assets symbols runtime win microsoft netcore testhost preview symbols nupkg assets symbols system configuration configurationmanager preview symbols nupkg assets symbols runtime win microsoft netcore ilasm preview symbols nupkg assets symbols runtime win microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime win microsoft netcore ildasm preview symbols nupkg assets symbols runtime osx microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime osx microsoft netcore testhost preview symbols nupkg assets symbols runtime osx microsoft netcore dotnethost preview symbols nupkg assets symbols runtime osx microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime osx microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime osx microsoft netcore ilasm preview symbols nupkg assets symbols runtime osx microsoft netcore ildasm preview symbols nupkg assets symbols runtime osx microsoft netcore testhost preview symbols nupkg assets symbols runtime win arm microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime win arm microsoft netcore dotnethost preview symbols nupkg assets symbols runtime win arm microsoft netcore ilasm preview symbols nupkg assets symbols runtime linux microsoft netcore dotnethost preview symbols nupkg assets symbols system io filesystem accesscontrol preview symbols nupkg assets symbols system formats cbor preview symbols nupkg assets symbols system formats preview symbols nupkg assets symbols system io packaging preview symbols nupkg assets symbols system io pipes accesscontrol preview symbols nupkg assets symbols system memory data preview symbols nupkg assets symbols system net http json preview symbols nupkg assets symbols system reflection metadataloadcontext preview symbols nupkg assets symbols system resources extensions preview symbols nupkg assets symbols system security cryptography pkcs preview symbols nupkg assets symbols system runtime compilerservices unsafe preview symbols nupkg assets symbols system security accesscontrol preview symbols nupkg assets symbols system io ports preview symbols nupkg assets symbols system security cryptography xml preview symbols nupkg assets symbols system data odbc preview symbols nupkg assets symbols runtime win microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime win microsoft netcore ilasm preview symbols nupkg assets symbols runtime win microsoft netcore ildasm preview symbols nupkg assets symbols runtime win microsoft netcore testhost preview symbols nupkg assets symbols runtime win microsoft netcore dotnethost preview symbols nupkg assets symbols runtime win microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime win microsoft netcore dotnethostresolver preview symbols nupkg assets symbols system text encodings web preview symbols nupkg assets symbols runtime linux microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime osx microsoft netcore ildasm preview symbols nupkg assets symbols runtime linux musl microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime linux musl arm microsoft netcore testhost preview symbols nupkg assets symbols runtime win arm microsoft netcore ildasm preview symbols nupkg assets symbols runtime linux musl microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime linux musl microsoft netcore dotnethost preview symbols nupkg assets symbols runtime linux musl microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime linux musl microsoft netcore ilasm preview symbols nupkg assets symbols runtime win microsoft netcore dotnethost preview symbols nupkg assets symbols system diagnostics diagnosticsource preview symbols nupkg assets symbols system diagnostics eventlog preview symbols nupkg assets symbols system componentmodel composition registration preview symbols nupkg assets symbols system composition preview symbols nupkg assets symbols system composition attributedmodel preview symbols nupkg assets symbols system composition hosting preview symbols nupkg microsoft extensions logging debug microsoft extensions logging tracesource assets symbols system security principal windows preview symbols nupkg runtime preview runtime productversion txt assets symbols runtime linux microsoft netcore dotnetapphost preview symbols nupkg microsoft systemevents microsoft registry accesscontrol microsoft netcore dotnethostpolicy microsoft netcore ilasm microsoft netcore ildasm microsoft netcore dotnethostresolver runtime osx microsoft netcore dotnetapphost runtime osx microsoft netcore ilasm runtime osx microsoft netcore dotnethost runtime osx microsoft netcore dotnethostpolicy runtime win arm microsoft netcore dotnetapphost runtime osx microsoft netcore dotnethostresolver runtime osx microsoft netcore ildasm runtime win microsoft netcore dotnetapphost runtime osx microsoft netcore testhost runtime osx runtime native system io ports runtime win arm microsoft netcore dotnethost runtime win arm microsoft netcore ilasm runtime win arm microsoft netcore dotnethostpolicy runtime win arm microsoft netcore dotnethostresolver microsoft netcore app runtime aot osx cross tvossimulator microsoft netcore app runtime aot osx cross tvossimulator microsoft netcore app runtime aot win cross android microsoft netcore app runtime aot win cross android microsoft netcore app runtime aot win cross android microsoft netcore app runtime linux arm microsoft netcore app runtime linux microsoft netcore app runtime linux musl microsoft netcore app runtime mono android microsoft netcore app runtime mono android microsoft netcore app runtime mono ios microsoft netcore app linux microsoft netcore app runtime linux musl arm microsoft netcore app runtime aot osx cross ios microsoft netcore app osx microsoft netcore app runtime aot osx cross browser wasm microsoft netcore app runtime aot linux cross android microsoft netcore app ref microsoft netcore app runtime aot linux cross android assets symbols microsoft netcore app linux musl arm preview symbols nupkg assets symbols microsoft netcore app win arm preview symbols nupkg assets symbols microsoft netcore app win preview symbols nupkg assets symbols microsoft netcore app host linux arm preview symbols nupkg assets symbols microsoft netcore app host linux preview symbols nupkg microsoft netcore app win microsoft netcore app runtime aot osx cross android microsoft netcore app runtime aot osx cross android assets symbols microsoft netcore app pgo preview symbols nupkg assets symbols microsoft netcore app runtime aot linux cross browser wasm preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross ios preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross browser wasm preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross iossimulator preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross tvossimulator preview symbols nupkg assets symbols microsoft netcore app runtime aot win cross android preview symbols nupkg assets symbols microsoft net runtime webassembly sdk preview symbols nupkg assets symbols microsoft net sdk il preview symbols nupkg assets symbols microsoft net workload mono toolchain manifest preview symbols nupkg assets symbols microsoft netcore app linux musl preview symbols nupkg assets symbols microsoft netcore app runtime osx preview symbols nupkg assets symbols microsoft netcore app runtime win preview symbols nupkg assets symbols microsoft netcore browserdebughost transport preview symbols nupkg assets symbols microsoft netcore app runtime mono tvos preview symbols nupkg assets symbols microsoft netcore app runtime linux preview symbols nupkg assets symbols microsoft netcore app runtime mono android arm preview symbols nupkg assets symbols microsoft netcore app runtime mono android preview symbols nupkg assets symbols microsoft netcore app runtime mono browser wasm preview symbols nupkg assets symbols microsoft netcore app runtime mono iossimulator preview symbols nupkg assets symbols microsoft netcore app runtime mono iossimulator preview symbols nupkg assets symbols microsoft netcore app runtime mono linux preview symbols nupkg assets symbols microsoft netcore app runtime mono ios preview symbols nupkg assets symbols microsoft netcore app runtime mono linux musl preview symbols nupkg assets symbols microsoft netcore app runtime mono linux preview symbols nupkg microsoft netcore app composite microsoft extensions options microsoft extensions options configurationextensions microsoft extensions options dataannotations microsoft extensions primitives microsoft ilverification microsoft extensions http microsoft io redist microsoft extensions configuration commandline microsoft extensions configuration environmentvariables microsoft netcore app linux musl microsoft extensions configuration usersecrets microsoft netcore app runtime aot osx cross iossimulator microsoft netcore app runtime aot osx cross tvos microsoft netcore app runtime aot win cross android arm microsoft netcore app runtime aot osx cross iossimulator microsoft netcore app runtime mono android microsoft netcore app runtime aot linux cross android microsoft netcore app runtime aot linux cross browser wasm microsoft netcore app runtime aot osx cross android arm runtime win microsoft netcore dotnethostpolicy assets symbols microsoft netcore app host win preview symbols nupkg assets symbols microsoft netcore app ref preview symbols nupkg assets symbols microsoft netcore app runtime aot linux cross android preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross ios arm preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross maccatalyst preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross tvos preview symbols nupkg assets symbols microsoft netcore app linux preview symbols nupkg assets symbols microsoft netcore app osx preview symbols nupkg assets symbols microsoft netcore app runtime osx preview symbols nupkg assets symbols microsoft netcore app runtime win preview symbols nupkg assets symbols runtime linux arm microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime linux arm microsoft netcore dotnethost preview symbols nupkg assets symbols runtime linux arm microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime linux arm microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime linux arm microsoft netcore ilasm preview symbols nupkg assets symbols runtime linux arm microsoft netcore ildasm preview symbols nupkg assets symbols microsoft netcore app runtime linux musl preview symbols nupkg assets symbols microsoft netcore app runtime mono ios arm preview symbols nupkg assets symbols microsoft netcore app runtime mono maccatalyst preview symbols nupkg assets symbols microsoft netcore app runtime mono llvm osx preview symbols nupkg assets symbols system text encoding codepages preview symbols nupkg assets symbols system servicemodel syndication preview symbols nupkg assets symbols system serviceprocess servicecontroller preview symbols nupkg assets symbols system speech preview symbols nupkg assets symbols system text json preview symbols nupkg assets symbols runtime linux microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime linux microsoft netcore ildasm preview symbols nupkg assets symbols runtime linux microsoft netcore ilasm preview symbols nupkg assets symbols runtime linux microsoft netcore testhost preview symbols nupkg assets symbols runtime linux runtime native system io ports preview symbols nupkg assets symbols runtime native system io ports preview symbols nupkg assets symbols runtime osx microsoft netcore dotnethost preview symbols nupkg assets symbols runtime osx microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime osx microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime osx microsoft netcore ilasm preview symbols nupkg assets symbols runtime osx runtime native system io ports preview symbols nupkg assets symbols runtime win arm microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime win arm microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime linux microsoft crossosdiag private coreclr preview symbols nupkg assets symbols runtime linux musl microsoft netcore testhost preview symbols nupkg assets symbols runtime linux microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime linux microsoft netcore ildasm preview symbols nupkg assets symbols runtime linux musl arm microsoft netcore ilasm preview symbols nupkg assets symbols runtime linux musl microsoft crossosdiag private coreclr preview symbols nupkg assets symbols runtime win microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime linux musl microsoft netcore dotnethost preview symbols nupkg assets symbols runtime linux musl microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime linux musl microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime linux musl microsoft netcore ilasm preview symbols nupkg assets symbols runtime linux musl microsoft netcore ildasm preview symbols nupkg assets symbols system diagnostics performancecounter preview symbols nupkg assets symbols system directoryservices protocols preview symbols nupkg assets symbols system io hashing preview symbols nupkg assets symbols system management preview symbols nupkg assets symbols system numerics tensors preview symbols nupkg assets symbols system reflection context preview symbols nupkg assets symbols system reflection metadata preview symbols nupkg assets symbols runtime win microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols system composition typedparts preview symbols nupkg assets symbols runtime win microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime linux microsoft netcore dotnethost preview symbols nupkg runtime linux runtime native system io ports microsoft netcore app runtime mono linux musl runtime native system io ports microsoft netcore app runtime mono linux runtime osx microsoft netcore dotnethost microsoft netcore app runtime mono linux arm runtime osx microsoft netcore dotnethostpolicy runtime linux musl microsoft netcore testhost microsoft extensions logging abstractions microsoft extensions logging microsoft extensions logging configuration microsoft extensions logging console microsoft extensions logging eventlog microsoft extensions logging eventsource microsoft net runtime wasm sample mono microsoft netcore app linux musl microsoft net workload mono toolchain manifest microsoft netcore app linux musl arm microsoft extensions hosting windowsservices dotnet ilverify microsoft extensions hosting abstractions microsoft diagnostics tracing eventsource redist microsoft netcore app osx microsoft netcore app runtime aot osx cross iossimulator microsoft netcore app runtime aot osx cross maccatalyst microsoft netcore app runtime aot osx cross maccatalyst microsoft netcore app runtime linux microsoft netcore app runtime mono android arm microsoft netcore app runtime mono ios arm microsoft netcore app runtime mono browser wasm microsoft netcore app runtime mono iossimulator microsoft netcore app win microsoft netcore app runtime aot linux cross android arm microsoft netcore app runtime aot osx cross android runtime win microsoft netcore dotnetapphost microsoft netcore app host win assets symbols runtime linux arm runtime native system io ports preview symbols nupkg assets symbols microsoft netcore app runtime aot linux cross android arm preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross android arm preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross iossimulator preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross tvossimulator preview symbols nupkg assets symbols microsoft netcore app runtime aot win cross android preview symbols nupkg assets symbols microsoft netcore app host win arm preview symbols nupkg assets symbols microsoft netcore app host osx preview symbols nupkg assets symbols microsoft netcore app host osx preview symbols nupkg runtime win microsoft netcore dotnethost assets symbols microsoft net runtime android sample mono preview symbols nupkg assets symbols microsoft net runtime ios sample mono preview symbols nupkg assets symbols microsoft net runtime monoaotcompiler task preview symbols nupkg assets symbols microsoft net runtime runtimeconfigparser task preview symbols nupkg assets symbols microsoft net runtime wasm sample mono preview symbols nupkg assets symbols microsoft netcore app win preview symbols nupkg assets symbols microsoft netcore app host linux musl arm preview symbols nupkg assets symbols microsoft netcore app host linux musl preview symbols nupkg assets symbols microsoft netcore app host linux musl preview symbols nupkg assets symbols microsoft netcore app host linux preview symbols nupkg assets symbols microsoft private corefx oob preview symbols nupkg assets symbols microsoft registry preview symbols nupkg assets symbols microsoft registry accesscontrol preview symbols nupkg assets symbols microsoft systemevents preview symbols nupkg assets symbols microsoft windows compatibility preview symbols nupkg assets symbols microsoft xmlserializer generator preview symbols nupkg assets symbols runtime linux arm microsoft crossosdiag private coreclr preview symbols nupkg assets symbols microsoft netcore app runtime linux musl arm preview symbols nupkg assets symbols microsoft netcore app runtime mono android preview symbols nupkg assets symbols microsoft netcore app runtime mono llvm linux preview symbols nupkg assets symbols microsoft netcore app runtime mono maccatalyst preview symbols nupkg assets symbols microsoft netcore app runtime mono osx preview symbols nupkg assets symbols microsoft netcore app runtime mono linux arm preview symbols nupkg assets symbols microsoft netcore app runtime mono osx preview symbols nupkg system memory data system net http winhttphandler assets symbols microsoft io redist preview symbols nupkg assets symbols microsoft net hostmodel pgo preview symbols nupkg assets symbols microsoft extensions primitives preview symbols nupkg system net http json system reflection metadataloadcontext system numerics tensors system reflection context system resources extensions system reflection metadata system runtime caching system runtime compilerservices unsafe system security accesscontrol runtime win microsoft netcore testhost system componentmodel composition registration system composition convention system composition attributedmodel system composition system data odbc system composition hosting system composition typedparts system composition runtime system data oledb assets symbols microsoft ilverification preview symbols nupkg system directoryservices system formats cbor system io filesystem accesscontrol system configuration configurationmanager assets symbols microsoft extensions dependencyinjection preview symbols nupkg assets symbols microsoft extensions dependencyinjection specification tests preview symbols nupkg assets symbols microsoft extensions dependencymodel preview symbols nupkg assets symbols microsoft extensions hosting preview symbols nupkg assets symbols microsoft extensions configuration ini preview symbols nupkg assets symbols microsoft extensions logging console preview symbols nupkg assets symbols microsoft extensions logging debug preview symbols nupkg assets symbols microsoft extensions logging eventsource preview symbols nupkg assets symbols microsoft extensions options dataannotations preview symbols nupkg assets symbols microsoft extensions hosting systemd preview symbols nupkg assets symbols microsoft extensions configuration fileextensions preview symbols nupkg assets symbols microsoft extensions configuration json preview symbols nupkg assets symbols microsoft extensions configuration preview symbols nupkg assets symbols microsoft aspnetcore internal transport preview symbols nupkg runtime preview productversion txt assets symbols runtime linux microsoft crossosdiag private coreclr preview symbols nupkg microsoft netcore app runtime mono llvm aot linux assets symbols microsoft netcore app runtime aot linux cross android preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross android preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross iossimulator preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross maccatalyst preview symbols nupkg assets symbols microsoft netcore app host win preview symbols nupkg assets symbols microsoft netcore app composite preview symbols nupkg assets symbols microsoft netcore app runtime aot win cross android preview symbols nupkg assets symbols microsoft netcore app osx preview symbols nupkg assets symbols microsoft netcore app runtime linux arm preview symbols nupkg assets symbols microsoft netcore app runtime win preview symbols nupkg assets symbols microsoft netcore app runtime mono tvossimulator preview symbols nupkg assets symbols microsoft netcore app runtime mono llvm aot osx preview symbols nupkg system diagnostics eventlog system diagnostics diagnosticsource system diagnostics performancecounter system directoryservices accountmanagement system directoryservices protocols system drawing common assets symbols microsoft extensions configuration binder preview symbols nupkg assets symbols microsoft extensions configuration abstractions preview symbols nupkg assets symbols ilcompiler reflection readytorun experimental preview symbols nupkg assets symbols system codedom preview symbols nupkg assets symbols system componentmodel composition preview symbols nupkg assets symbols system composition convention preview symbols nupkg assets symbols system composition runtime preview symbols nupkg assets symbols runtime linux arm microsoft netcore testhost preview symbols nupkg runtime linux arm microsoft netcore dotnetapphost microsoft xmlserializer generator microsoft windows compatibility runtime linux arm microsoft netcore dotnethostpolicy runtime linux arm microsoft netcore dotnethost runtime linux arm microsoft netcore ilasm runtime linux microsoft netcore dotnetapphost runtime linux arm microsoft netcore dotnethostresolver runtime linux arm microsoft netcore ildasm runtime linux arm microsoft netcore testhost runtime linux arm runtime native system io ports runtime linux microsoft netcore dotnethost runtime linux microsoft netcore ilasm runtime linux microsoft netcore dotnethostresolver runtime linux microsoft netcore dotnethostpolicy runtime linux microsoft netcore ildasm runtime linux microsoft netcore testhost microsoft netcore app runtime mono llvm aot linux runtime linux musl arm microsoft netcore dotnetapphost runtime linux musl arm microsoft netcore dotnethostpolicy microsoft netcore testhost microsoft netcore platforms microsoft netcore app runtime mono maccatalyst microsoft netcore app runtime mono tvossimulator microsoft netcore app runtime mono tvossimulator microsoft netcore app runtime mono osx microsoft netcore app runtime mono osx microsoft netcore app runtime osx microsoft netcore app runtime mono win runtime linux musl arm microsoft netcore ilasm microsoft netcore app runtime win microsoft netcore app runtime win microsoft netcore app runtime mono win microsoft netcore dotnetapphost microsoft netcore dotnethost runtime linux musl arm microsoft netcore ildasm runtime linux musl arm microsoft netcore testhost runtime win arm microsoft netcore ildasm runtime osx microsoft netcore testhost runtime win microsoft netcore dotnetapphost runtime win microsoft netcore dotnethost runtime win microsoft netcore dotnethostpolicy runtime win microsoft netcore ilasm runtime win microsoft netcore dotnethostresolver runtime win microsoft netcore ildasm runtime win microsoft netcore testhost microsoft netcore app runtime mono linux runtime win microsoft netcore dotnethostpolicy runtime win microsoft netcore dotnethost runtime win microsoft netcore dotnethostresolver runtime win microsoft netcore ilasm microsoft net runtime ios sample mono microsoft net runtime android sample mono microsoft net runtime monoaotcompiler task microsoft net runtime webassembly sdk microsoft net runtime runtimeconfigparser task microsoft netcore app linux microsoft net sdk il microsoft netcore app linux arm microsoft bcl asyncinterfaces microsoft extensions caching memory microsoft extensions caching abstractions microsoft extensions configuration microsoft extensions configuration abstractions microsoft extensions configuration binder microsoft extensions configuration fileextensions microsoft extensions configuration json microsoft extensions hosting systemd microsoft extensions dependencyinjection microsoft extensions configuration xml microsoft extensions dependencyinjection specification tests microsoft extensions dependencyinjection abstractions microsoft extensions dependencymodel microsoft extensions fileproviders abstractions microsoft extensions fileproviders composite microsoft extensions fileproviders physical microsoft extensions hosting microsoft extensions filesystemglobbing microsoft extensions configuration ini runtime win microsoft netcore testhost assets symbols microsoft netcore app linux musl preview symbols nupkg assets symbols microsoft netcore app runtime aot win cross browser wasm preview symbols nupkg assets symbols microsoft netcore dotnetapphost preview symbols nupkg assets symbols microsoft netcore dotnethost preview symbols nupkg assets symbols microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols microsoft netcore dotnethostresolver preview symbols nupkg assets symbols microsoft netcore ilasm preview symbols nupkg assets symbols microsoft netcore app runtime mono win preview symbols nupkg assets symbols microsoft netcore ildasm preview symbols nupkg assets symbols microsoft netcore app runtime mono iossimulator preview symbols nupkg assets symbols microsoft netcore app runtime mono llvm aot linux preview symbols nupkg assets symbols microsoft netcore app runtime mono llvm linux preview symbols nupkg system management system security cryptography pkcs system security cryptography protecteddata system security permissions system security cryptography xml system security principal windows system text encoding codepages system servicemodel syndication system speech system serviceprocess servicecontroller system text json system text encodings web system threading tasks dataflow system threading accesscontrol system threading channels system io pipes accesscontrol system io ports system windows extensions system io pipelines system io packaging runtime win microsoft netcore dotnethostresolver runtime win microsoft netcore ilasm runtime win microsoft netcore ildasm system codedom system collections immutable system componentmodel composition system formats system io hashing assets symbols microsoft extensions configuration usersecrets preview symbols nupkg assets symbols microsoft extensions configuration xml preview symbols nupkg assets symbols microsoft extensions dependencyinjection abstractions preview symbols nupkg assets symbols microsoft extensions fileproviders abstractions preview symbols nupkg assets symbols microsoft extensions fileproviders composite preview symbols nupkg assets symbols microsoft extensions fileproviders physical preview symbols nupkg assets symbols microsoft extensions filesystemglobbing preview symbols nupkg assets symbols microsoft extensions hostfactoryresolver sources preview symbols nupkg assets symbols microsoft extensions hosting abstractions preview symbols nupkg assets symbols microsoft extensions hosting windowsservices preview symbols nupkg assets symbols microsoft extensions http preview symbols nupkg assets symbols microsoft extensions logging preview symbols nupkg assets symbols microsoft extensions logging abstractions preview symbols nupkg assets symbols microsoft extensions logging configuration preview symbols nupkg assets symbols microsoft extensions logging eventlog preview symbols nupkg assets symbols microsoft extensions logging tracesource preview symbols nupkg assets symbols microsoft extensions options preview symbols nupkg assets symbols microsoft extensions options configurationextensions preview symbols nupkg assets symbols microsoft extensions configuration commandline preview symbols nupkg assets symbols microsoft bcl asyncinterfaces preview symbols nupkg assets symbols runtime linux microsoft netcore ilasm preview symbols nupkg assets symbols system threading accesscontrol preview symbols nupkg assets symbols system threading channels preview symbols nupkg assets symbols system security permissions preview symbols nupkg assets symbols system security cryptography protecteddata preview symbols nupkg assets symbols runtime linux musl arm microsoft netcore dotnetapphost preview symbols nupkg assets symbols runtime linux microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime linux musl arm microsoft crossosdiag private coreclr preview symbols nupkg assets symbols runtime linux microsoft netcore testhost preview symbols nupkg assets symbols runtime linux runtime native system io ports preview symbols nupkg assets symbols runtime linux musl arm microsoft netcore dotnethostpolicy preview symbols nupkg assets symbols runtime linux musl arm microsoft netcore dotnethost preview symbols nupkg assets symbols runtime linux musl arm microsoft netcore dotnethostresolver preview symbols nupkg assets symbols runtime linux musl arm microsoft netcore ildasm preview symbols nupkg assets symbols runtime linux musl microsoft netcore ildasm preview symbols nupkg assets symbols runtime linux musl microsoft netcore testhost preview symbols nupkg assets symbols runtime linux musl microsoft crossosdiag private coreclr preview symbols nupkg assets symbols runtime win arm microsoft netcore testhost preview symbols nupkg assets symbols system directoryservices accountmanagement preview symbols nupkg assets symbols system directoryservices preview symbols nupkg assets symbols system drawing common preview symbols nupkg assets symbols system io pipelines preview symbols nupkg assets symbols system data oledb preview symbols nupkg assets symbols system net http winhttphandler preview symbols nupkg assets symbols system runtime caching preview symbols nupkg assets symbols runtime win microsoft netcore dotnethost preview symbols nupkg assets symbols runtime win microsoft netcore testhost preview symbols nupkg assets symbols system collections immutable preview symbols nupkg runtime linux runtime native system io ports microsoft netcore app runtime mono llvm aot osx runtime linux musl arm microsoft netcore dotnethost runtime linux musl arm microsoft netcore dotnethostresolver microsoft registry microsoft netcore app runtime mono llvm linux microsoft netcore app runtime mono llvm linux microsoft netcore app runtime mono llvm osx microsoft netcore app runtime mono maccatalyst microsoft netcore app runtime mono tvos microsoft netcore app runtime osx microsoft netcore app runtime win arm microsoft netcore app runtime win runtime win microsoft netcore ildasm runtime win arm microsoft netcore testhost runtime linux musl microsoft netcore dotnetapphost runtime osx microsoft netcore dotnethostresolver runtime osx microsoft netcore ildasm runtime linux musl microsoft netcore dotnethost runtime linux musl microsoft netcore dotnethostpolicy runtime linux musl microsoft netcore dotnethostresolver runtime linux musl microsoft netcore ilasm runtime linux musl microsoft netcore dotnetapphost runtime linux musl microsoft netcore ildasm runtime linux musl microsoft netcore testhost runtime linux musl microsoft netcore dotnethost runtime linux musl microsoft netcore dotnethostpolicy runtime linux musl microsoft netcore ilasm runtime linux musl microsoft netcore dotnethostresolver runtime linux microsoft netcore dotnetapphost runtime osx microsoft netcore ilasm runtime linux musl microsoft netcore ildasm runtime linux microsoft netcore dotnethost runtime linux microsoft netcore dotnethostpolicy runtime linux microsoft netcore dotnethostresolver runtime linux microsoft netcore ilasm runtime linux microsoft netcore ildasm runtime osx microsoft netcore dotnetapphost runtime linux microsoft netcore testhost microsoft netcore app runtime aot win cross browser wasm microsoft netcore app runtime linux musl microsoft netcore app runtime mono iossimulator microsoft netcore app runtime mono iossimulator microsoft netcore app win arm microsoft netcore app win microsoft netcore app runtime aot osx cross ios arm microsoft netcore app host linux arm microsoft netcore app host linux musl arm microsoft netcore app host linux microsoft netcore app host linux musl microsoft netcore app host linux microsoft netcore app host linux musl microsoft netcore app host osx microsoft netcore app host osx microsoft netcore app host win microsoft netcore app host win arm microsoft netcore app host win assets symbols microsoft netcore app host win preview symbols nupkg assets symbols microsoft netcore app runtime aot linux cross android preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross android preview symbols nupkg assets symbols microsoft netcore app runtime aot osx cross android preview symbols nupkg assets symbols microsoft netcore app runtime aot win cross android arm preview symbols nupkg assets symbols microsoft netcore app linux arm preview symbols nupkg assets symbols microsoft netcore app linux preview symbols nupkg assets symbols microsoft netcore app win preview symbols nupkg assets symbols microsoft netcore app runtime linux preview symbols nupkg assets symbols microsoft netcore app runtime mono win preview symbols nupkg assets symbols microsoft netcore app runtime win arm preview symbols nupkg assets symbols microsoft netcore testhost preview symbols nupkg assets symbols microsoft net hostmodel preview symbols nupkg assets symbols microsoft netcore app runtime linux musl preview symbols nupkg assets symbols microsoft netcore app runtime mono android preview symbols nupkg assets symbols microsoft netcore app runtime mono tvossimulator preview symbols nupkg assets symbols microsoft netcore app runtime mono llvm aot linux preview symbols nupkg assets symbols microsoft extensions configuration environmentvariables preview symbols nupkg assets symbols microsoft diagnostics tracing eventsource redist preview symbols nupkg assets symbols microsoft extensions caching abstractions preview symbols nupkg assets symbols microsoft extensions caching memory preview symbols nupkg assets symbols dotnet pgo preview symbols nupkg assets symbols dotnet ilverify preview symbols nupkg source code validation x validateloc could not find matching entry in generated contract x steps were not validated for contract x contract was not validated x powershell exited with code changes lee coward merged pr add cbl mariner to rpm repo list lee coward add cbl mariner to rpm repo list lee coward merged pr add cbl mariner runtime deps installer michelle mcdaniel merged pr merge production main michelle mcdaniel merged pr fix config file usage in fast insertion pipeline lee coward add cbl mariner runtime deps installer michelle mcdaniel merged pr publish the signed mac and linux files to staging locations alex svyatenkiy merged pr fixes to release pipelines alexsvyat one more dependency michelle mcdaniel merged pr fix releasedate logic | 0 |
3,068 | 2,663,352,606 | IssuesEvent | 2015-03-20 04:14:34 | codeforamerica/brigade-alpha | https://api.github.com/repos/codeforamerica/brigade-alpha | closed | Cartography! | design ★★ | #### Manager Speak
We've been rocking the same basemap on the Brigade site foooorever. We need a new coat of paint, a fresh approach, a kick in the pants. Lets get something edgy, provacative, something that really pops. It could be Stameny and dark. It could minimal and show off the Brigades. It could be in your face. Whatever it is, lets make sure it follows the latest trends of the geonistas.
Who's with me? Who's got what it takes? Are you a wizard ninja?
Go to Mapbox and make your visions real for our market customers.
https://www.mapbox.com/editor/?id=codeforamerica.map-hhckoiuj#project | 1.0 | Cartography! - #### Manager Speak
We've been rocking the same basemap on the Brigade site foooorever. We need a new coat of paint, a fresh approach, a kick in the pants. Lets get something edgy, provacative, something that really pops. It could be Stameny and dark. It could minimal and show off the Brigades. It could be in your face. Whatever it is, lets make sure it follows the latest trends of the geonistas.
Who's with me? Who's got what it takes? Are you a wizard ninja?
Go to Mapbox and make your visions real for our market customers.
https://www.mapbox.com/editor/?id=codeforamerica.map-hhckoiuj#project | non_priority | cartography manager speak we ve been rocking the same basemap on the brigade site foooorever we need a new coat of paint a fresh approach a kick in the pants lets get something edgy provacative something that really pops it could be stameny and dark it could minimal and show off the brigades it could be in your face whatever it is lets make sure it follows the latest trends of the geonistas who s with me who s got what it takes are you a wizard ninja go to mapbox and make your visions real for our market customers | 0 |
1,396 | 3,193,911,404 | IssuesEvent | 2015-09-30 09:00:01 | dylan-hackers/mindy | https://api.github.com/repos/dylan-hackers/mindy | opened | Automated builds on Jenkins | A-infrastructure E-easy | We should set up some automated builds on https://jenkins.opendylan.org/ for the various platforms. | 1.0 | Automated builds on Jenkins - We should set up some automated builds on https://jenkins.opendylan.org/ for the various platforms. | non_priority | automated builds on jenkins we should set up some automated builds on for the various platforms | 0 |
91,437 | 10,720,565,928 | IssuesEvent | 2019-10-26 18:36:20 | jilesingh/LearnPythonTheHardWay | https://api.github.com/repos/jilesingh/LearnPythonTheHardWay | closed | use committ messages wisely | documentation | when you committ something then please use committ message which gives some information about the committ, for eg. you have included exercise 32 to 35 then committ message can be "ex32 to ex35 added - mostly loops implementation"
Also remember don't make the committ message too long, at most 10 words | 1.0 | use committ messages wisely - when you committ something then please use committ message which gives some information about the committ, for eg. you have included exercise 32 to 35 then committ message can be "ex32 to ex35 added - mostly loops implementation"
Also remember don't make the committ message too long, at most 10 words | non_priority | use committ messages wisely when you committ something then please use committ message which gives some information about the committ for eg you have included exercise to then committ message can be to added mostly loops implementation also remember don t make the committ message too long at most words | 0 |
204,691 | 23,272,118,652 | IssuesEvent | 2022-08-05 01:05:02 | t2kx/juice-shop | https://api.github.com/repos/t2kx/juice-shop | closed | CVE-2021-35065 (High) detected in glob-parent-3.1.0.tgz, glob-parent-5.1.1.tgz - autoclosed | security vulnerability | ## CVE-2021-35065 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-3.1.0.tgz</b>, <b>glob-parent-5.1.1.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-3.1.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent directory path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p>
<p>Path to dependency file: /frontend/package.json</p>
<p>Path to vulnerable library: /frontend/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.26.tgz (Root Library)
- copy-webpack-plugin-5.1.1.tgz
- :x: **glob-parent-3.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-5.1.1.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent/package.json,/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- standard-14.3.3.tgz (Root Library)
- eslint-6.8.0.tgz
- :x: **glob-parent-5.1.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/t2kx/juice-shop/commit/892c07158a9eaff6c38e82269f691bf26b48b694">892c07158a9eaff6c38e82269f691bf26b48b694</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-cj88-88mr-972w">https://github.com/advisories/GHSA-cj88-88mr-972w</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution (glob-parent): 6.0.1</p>
<p>Direct dependency fix Resolution (@angular-devkit/build-angular): 14.1.0</p><p>Fix Resolution (glob-parent): 6.0.1</p>
<p>Direct dependency fix Resolution (standard): 17.0.0-0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-35065 (High) detected in glob-parent-3.1.0.tgz, glob-parent-5.1.1.tgz - autoclosed - ## CVE-2021-35065 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-3.1.0.tgz</b>, <b>glob-parent-5.1.1.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-3.1.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent directory path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p>
<p>Path to dependency file: /frontend/package.json</p>
<p>Path to vulnerable library: /frontend/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.26.tgz (Root Library)
- copy-webpack-plugin-5.1.1.tgz
- :x: **glob-parent-3.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-5.1.1.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent/package.json,/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- standard-14.3.3.tgz (Root Library)
- eslint-6.8.0.tgz
- :x: **glob-parent-5.1.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/t2kx/juice-shop/commit/892c07158a9eaff6c38e82269f691bf26b48b694">892c07158a9eaff6c38e82269f691bf26b48b694</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-cj88-88mr-972w">https://github.com/advisories/GHSA-cj88-88mr-972w</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution (glob-parent): 6.0.1</p>
<p>Direct dependency fix Resolution (@angular-devkit/build-angular): 14.1.0</p><p>Fix Resolution (glob-parent): 6.0.1</p>
<p>Direct dependency fix Resolution (standard): 17.0.0-0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in glob parent tgz glob parent tgz autoclosed cve high severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent directory path library home page a href path to dependency file frontend package json path to vulnerable library frontend node modules glob parent package json dependency hierarchy build angular tgz root library copy webpack plugin tgz x glob parent tgz vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href path to dependency file package json path to vulnerable library node modules glob parent package json node modules glob parent package json dependency hierarchy standard tgz root library eslint tgz x glob parent tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package glob parent before are vulnerable to regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent direct dependency fix resolution angular devkit build angular fix resolution glob parent direct dependency fix resolution standard step up your open source security game with mend | 0 |
13,216 | 3,317,314,479 | IssuesEvent | 2015-11-06 21:02:59 | FactomProject/WorkItems | https://api.github.com/repos/FactomProject/WorkItems | closed | all script needs to pull twice when it cannot find a repository being checked out. | 2 - Testing | this will stop the need to run the all script twice. | 1.0 | all script needs to pull twice when it cannot find a repository being checked out. - this will stop the need to run the all script twice. | non_priority | all script needs to pull twice when it cannot find a repository being checked out this will stop the need to run the all script twice | 0 |
105,152 | 11,433,835,609 | IssuesEvent | 2020-02-04 16:20:26 | LujanWorld/GDL004-social-network | https://api.github.com/repos/LujanWorld/GDL004-social-network | closed | User profile-like-tests | bug documentation enhancement | - [x] research create user profile
- [x] applying user profile
- [x] edit user profile
- [x] add photos
- [ ] testing functionality | 1.0 | User profile-like-tests - - [x] research create user profile
- [x] applying user profile
- [x] edit user profile
- [x] add photos
- [ ] testing functionality | non_priority | user profile like tests research create user profile applying user profile edit user profile add photos testing functionality | 0 |
147,867 | 23,286,050,345 | IssuesEvent | 2022-08-05 16:36:44 | FirstDo/DoneList | https://api.github.com/repos/FirstDo/DoneList | closed | [UI] CreateDoneViewController / EditDoneViewController UI / 디자인 | UI/Design | - [x] placeholder icon의 image / color
- [x] collectionview icon의 image / color
- [x] collectionView의 task 종류 늘리기
- [x] title text, title icon
- [x] doneTextLabel의 placeholder
- [x] makeButton과 createButton의 title / 색상 | 1.0 | [UI] CreateDoneViewController / EditDoneViewController UI / 디자인 - - [x] placeholder icon의 image / color
- [x] collectionview icon의 image / color
- [x] collectionView의 task 종류 늘리기
- [x] title text, title icon
- [x] doneTextLabel의 placeholder
- [x] makeButton과 createButton의 title / 색상 | non_priority | createdoneviewcontroller editdoneviewcontroller ui 디자인 placeholder icon의 image color collectionview icon의 image color collectionview의 task 종류 늘리기 title text title icon donetextlabel의 placeholder makebutton과 createbutton의 title 색상 | 0 |
15,238 | 9,523,159,082 | IssuesEvent | 2019-04-27 15:02:38 | henriquecarv/randomquotes | https://api.github.com/repos/henriquecarv/randomquotes | closed | CVE-2018-11698 High Severity Vulnerability detected by WhiteSource | security vulnerability | ## CVE-2018-11698 - High Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.11.0</b></p></summary>
<p>
<p>:rainbow: Node.js bindings to libsass</p>
<p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (125)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /randomquotes/node_modules/node-sass/src/libsass/src/expand.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/color_maps.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_util.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/utf8/unchecked.h
- /randomquotes/node_modules/node-sass/src/libsass/src/output.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_values.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/util.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/emitter.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/lexer.cpp
- /randomquotes/node_modules/node-sass/src/libsass/test/test_node.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/plugins.cpp
- /randomquotes/node_modules/node-sass/src/libsass/include/sass/base.h
- /randomquotes/node_modules/node-sass/src/libsass/src/position.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/subset_map.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/operation.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /randomquotes/node_modules/node-sass/src/custom_importer_bridge.cpp
- /randomquotes/node_modules/node-sass/src/libsass/contrib/plugin.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/functions.hpp
- /randomquotes/node_modules/node-sass/src/libsass/test/test_superselector.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/eval.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/utf8_string.hpp
- /randomquotes/node_modules/node-sass/src/sass_context_wrapper.h
- /randomquotes/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/node.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/parser.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/subset_map.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/emitter.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/listize.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_functions.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/output.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/functions.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/cssize.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/prelexer.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/paths.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/inspect.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/color.cpp
- /randomquotes/node_modules/node-sass/src/libsass/test/test_unification.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/values.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_util.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/source_map.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/list.h
- /randomquotes/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/json.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/units.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/units.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/context.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/utf8/checked.h
- /randomquotes/node_modules/node-sass/src/libsass/src/listize.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/string.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/context.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/boolean.h
- /randomquotes/node_modules/node-sass/src/libsass/include/sass2scss.h
- /randomquotes/node_modules/node-sass/src/libsass/src/eval.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/expand.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/factory.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/operators.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/boolean.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/source_map.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/value.h
- /randomquotes/node_modules/node-sass/src/libsass/src/utf8_string.cpp
- /randomquotes/node_modules/node-sass/src/callback_bridge.h
- /randomquotes/node_modules/node-sass/src/libsass/src/file.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/node.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/environment.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/extend.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_context.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/operators.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/constants.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/parser.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/constants.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/list.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/cssize.cpp
- /randomquotes/node_modules/node-sass/src/libsass/include/sass/functions.h
- /randomquotes/node_modules/node-sass/src/libsass/src/util.cpp
- /randomquotes/node_modules/node-sass/src/custom_function_bridge.cpp
- /randomquotes/node_modules/node-sass/src/custom_importer_bridge.h
- /randomquotes/node_modules/node-sass/src/libsass/src/bind.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/inspect.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_functions.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/backtrace.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/extend.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /randomquotes/node_modules/node-sass/src/libsass/src/debugger.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/cencode.c
- /randomquotes/node_modules/node-sass/src/libsass/src/base64vlq.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/number.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/color.h
- /randomquotes/node_modules/node-sass/src/libsass/src/c99func.c
- /randomquotes/node_modules/node-sass/src/libsass/src/position.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /randomquotes/node_modules/node-sass/src/libsass/include/sass/values.h
- /randomquotes/node_modules/node-sass/src/libsass/test/test_subset_map.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass2scss.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/null.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast.cpp
- /randomquotes/node_modules/node-sass/src/libsass/include/sass/context.h
- /randomquotes/node_modules/node-sass/src/libsass/src/to_c.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/to_value.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/color_maps.hpp
- /randomquotes/node_modules/node-sass/src/sass_context_wrapper.cpp
- /randomquotes/node_modules/node-sass/src/libsass/script/test-leaks.pl
- /randomquotes/node_modules/node-sass/src/libsass/src/lexer.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/to_c.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/map.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/to_value.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/b64/encode.h
- /randomquotes/node_modules/node-sass/src/libsass/src/file.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/environment.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/plugins.hpp
- /randomquotes/node_modules/node-sass/src/binding.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/debug.hpp
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::handle_error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11698>CVE-2018-11698</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-11698 High Severity Vulnerability detected by WhiteSource - ## CVE-2018-11698 - High Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.11.0</b></p></summary>
<p>
<p>:rainbow: Node.js bindings to libsass</p>
<p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (125)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /randomquotes/node_modules/node-sass/src/libsass/src/expand.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/color_maps.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_util.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/utf8/unchecked.h
- /randomquotes/node_modules/node-sass/src/libsass/src/output.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_values.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/util.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/emitter.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/lexer.cpp
- /randomquotes/node_modules/node-sass/src/libsass/test/test_node.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/plugins.cpp
- /randomquotes/node_modules/node-sass/src/libsass/include/sass/base.h
- /randomquotes/node_modules/node-sass/src/libsass/src/position.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/subset_map.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/operation.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /randomquotes/node_modules/node-sass/src/custom_importer_bridge.cpp
- /randomquotes/node_modules/node-sass/src/libsass/contrib/plugin.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/functions.hpp
- /randomquotes/node_modules/node-sass/src/libsass/test/test_superselector.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/eval.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/utf8_string.hpp
- /randomquotes/node_modules/node-sass/src/sass_context_wrapper.h
- /randomquotes/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/node.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/parser.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/subset_map.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/emitter.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/listize.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_functions.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/output.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/functions.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/cssize.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/prelexer.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/paths.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/inspect.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/color.cpp
- /randomquotes/node_modules/node-sass/src/libsass/test/test_unification.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/values.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_util.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/source_map.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/list.h
- /randomquotes/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/json.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/units.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/units.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/context.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/utf8/checked.h
- /randomquotes/node_modules/node-sass/src/libsass/src/listize.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/string.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/context.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/boolean.h
- /randomquotes/node_modules/node-sass/src/libsass/include/sass2scss.h
- /randomquotes/node_modules/node-sass/src/libsass/src/eval.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/expand.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/factory.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/operators.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/boolean.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/source_map.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/value.h
- /randomquotes/node_modules/node-sass/src/libsass/src/utf8_string.cpp
- /randomquotes/node_modules/node-sass/src/callback_bridge.h
- /randomquotes/node_modules/node-sass/src/libsass/src/file.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/node.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/environment.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/extend.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_context.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/operators.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/constants.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/parser.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/constants.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/list.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/cssize.cpp
- /randomquotes/node_modules/node-sass/src/libsass/include/sass/functions.h
- /randomquotes/node_modules/node-sass/src/libsass/src/util.cpp
- /randomquotes/node_modules/node-sass/src/custom_function_bridge.cpp
- /randomquotes/node_modules/node-sass/src/custom_importer_bridge.h
- /randomquotes/node_modules/node-sass/src/libsass/src/bind.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/inspect.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_functions.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/backtrace.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/extend.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /randomquotes/node_modules/node-sass/src/libsass/src/debugger.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/cencode.c
- /randomquotes/node_modules/node-sass/src/libsass/src/base64vlq.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/number.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/color.h
- /randomquotes/node_modules/node-sass/src/libsass/src/c99func.c
- /randomquotes/node_modules/node-sass/src/libsass/src/position.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /randomquotes/node_modules/node-sass/src/libsass/include/sass/values.h
- /randomquotes/node_modules/node-sass/src/libsass/test/test_subset_map.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass2scss.cpp
- /randomquotes/node_modules/node-sass/src/sass_types/null.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/ast.cpp
- /randomquotes/node_modules/node-sass/src/libsass/include/sass/context.h
- /randomquotes/node_modules/node-sass/src/libsass/src/to_c.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/to_value.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/color_maps.hpp
- /randomquotes/node_modules/node-sass/src/sass_context_wrapper.cpp
- /randomquotes/node_modules/node-sass/src/libsass/script/test-leaks.pl
- /randomquotes/node_modules/node-sass/src/libsass/src/lexer.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/to_c.hpp
- /randomquotes/node_modules/node-sass/src/sass_types/map.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/to_value.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/b64/encode.h
- /randomquotes/node_modules/node-sass/src/libsass/src/file.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/environment.hpp
- /randomquotes/node_modules/node-sass/src/libsass/src/plugins.hpp
- /randomquotes/node_modules/node-sass/src/binding.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /randomquotes/node_modules/node-sass/src/libsass/src/debug.hpp
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::handle_error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11698>CVE-2018-11698</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high severity vulnerability detected by whitesource cve high severity vulnerability vulnerable library node rainbow node js bindings to libsass library home page a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries randomquotes node modules node sass src libsass src expand hpp randomquotes node modules node sass src libsass src color maps cpp randomquotes node modules node sass src libsass src sass util hpp randomquotes node modules node sass src libsass src unchecked h randomquotes node modules node sass src libsass src output hpp randomquotes node modules node sass src libsass src sass values hpp randomquotes node modules node sass src libsass src util hpp randomquotes node modules node sass src libsass src emitter hpp randomquotes node modules node sass src libsass src lexer cpp randomquotes node modules node sass src libsass test test node cpp randomquotes node modules node sass src libsass src plugins cpp randomquotes node modules node sass src libsass include sass base h randomquotes node modules node sass src libsass src position hpp randomquotes node modules node sass src libsass src subset map hpp randomquotes node modules node sass src libsass src operation hpp randomquotes node modules node sass src libsass src remove placeholders cpp randomquotes node modules node sass src libsass src error handling hpp randomquotes node modules node sass src custom importer bridge cpp randomquotes node modules node sass src libsass contrib plugin cpp randomquotes node modules node sass src libsass src functions hpp randomquotes node modules node sass src libsass test test superselector cpp randomquotes node modules node sass src libsass src eval hpp randomquotes node modules node sass src libsass src string hpp randomquotes node modules node sass src sass context wrapper h randomquotes node modules node sass src libsass src error handling cpp randomquotes node modules node sass src libsass src node cpp randomquotes node modules node sass src libsass src parser cpp randomquotes node modules node sass src libsass src subset map cpp randomquotes node modules node sass src libsass src emitter cpp randomquotes node modules node sass src libsass src listize cpp randomquotes node modules node sass src libsass src ast hpp randomquotes node modules node sass src libsass src sass functions hpp randomquotes node modules node sass src libsass src memory sharedptr cpp randomquotes node modules node sass src libsass src output cpp randomquotes node modules node sass src libsass src check nesting cpp randomquotes node modules node sass src libsass src ast def macros hpp randomquotes node modules node sass src libsass src functions cpp randomquotes node modules node sass src libsass src cssize hpp randomquotes node modules node sass src libsass src prelexer cpp randomquotes node modules node sass src libsass src paths hpp randomquotes node modules node sass src libsass src ast fwd decl hpp randomquotes node modules node sass src libsass src inspect hpp randomquotes node modules node sass src sass types color cpp randomquotes node modules node sass src libsass test test unification cpp randomquotes node modules node sass src libsass src values cpp randomquotes node modules node sass src libsass src sass util cpp randomquotes node modules node sass src libsass src source map hpp randomquotes node modules node sass src sass types list h randomquotes node modules node sass src libsass src check nesting hpp randomquotes node modules node sass src libsass src json cpp randomquotes node modules node sass src libsass src units cpp randomquotes node modules node sass src libsass src units hpp randomquotes node modules node sass src libsass src context cpp randomquotes node modules node sass src libsass src checked h randomquotes node modules node sass src libsass src listize hpp randomquotes node modules node sass src sass types string cpp randomquotes node modules node sass src libsass src prelexer hpp randomquotes node modules node sass src libsass src context hpp randomquotes node modules node sass src sass types boolean h randomquotes node modules node sass src libsass include h randomquotes node modules node sass src libsass src eval cpp randomquotes node modules node sass src libsass src expand cpp randomquotes node modules node sass src sass types factory cpp randomquotes node modules node sass src libsass src operators cpp randomquotes node modules node sass src sass types boolean cpp randomquotes node modules node sass src libsass src source map cpp randomquotes node modules node sass src sass types value h randomquotes node modules node sass src libsass src string cpp randomquotes node modules node sass src callback bridge h randomquotes node modules node sass src libsass src file cpp randomquotes node modules node sass src libsass src sass cpp randomquotes node modules node sass src libsass src node hpp randomquotes node modules node sass src libsass src environment cpp randomquotes node modules node sass src libsass src extend hpp randomquotes node modules node sass src libsass src sass context hpp randomquotes node modules node sass src libsass src operators hpp randomquotes node modules node sass src libsass src constants hpp randomquotes node modules node sass src libsass src sass hpp randomquotes node modules node sass src libsass src ast fwd decl cpp randomquotes node modules node sass src libsass src parser hpp randomquotes node modules node sass src libsass src constants cpp randomquotes node modules node sass src sass types list cpp randomquotes node modules node sass src libsass src cssize cpp randomquotes node modules node sass src libsass include sass functions h randomquotes node modules node sass src libsass src util cpp randomquotes node modules node sass src custom function bridge cpp randomquotes node modules node sass src custom importer bridge h randomquotes node modules node sass src libsass src bind cpp randomquotes node modules node sass src libsass src inspect cpp randomquotes node modules node sass src libsass src sass functions cpp randomquotes node modules node sass src libsass src backtrace cpp randomquotes node modules node sass src libsass src extend cpp randomquotes node modules node sass src sass types sass value wrapper h randomquotes node modules node sass src libsass src debugger hpp randomquotes node modules node sass src libsass src cencode c randomquotes node modules node sass src libsass src cpp randomquotes node modules node sass src sass types number cpp randomquotes node modules node sass src sass types color h randomquotes node modules node sass src libsass src c randomquotes node modules node sass src libsass src position cpp randomquotes node modules node sass src libsass src remove placeholders hpp randomquotes node modules node sass src libsass src sass values cpp randomquotes node modules node sass src libsass include sass values h randomquotes node modules node sass src libsass test test subset map cpp randomquotes node modules node sass src libsass src cpp randomquotes node modules node sass src sass types null cpp randomquotes node modules node sass src libsass src ast cpp randomquotes node modules node sass src libsass include sass context h randomquotes node modules node sass src libsass src to c cpp randomquotes node modules node sass src libsass src to value hpp randomquotes node modules node sass src libsass src color maps hpp randomquotes node modules node sass src sass context wrapper cpp randomquotes node modules node sass src libsass script test leaks pl randomquotes node modules node sass src libsass src lexer hpp randomquotes node modules node sass src libsass src memory sharedptr hpp randomquotes node modules node sass src libsass src to c hpp randomquotes node modules node sass src sass types map cpp randomquotes node modules node sass src libsass src to value cpp randomquotes node modules node sass src libsass src encode h randomquotes node modules node sass src libsass src file hpp randomquotes node modules node sass src libsass src environment hpp randomquotes node modules node sass src libsass src plugins hpp randomquotes node modules node sass src binding cpp randomquotes node modules node sass src libsass src sass context cpp randomquotes node modules node sass src libsass src debug hpp vulnerability details an issue was discovered in libsass through an out of bounds read of a memory region was found in the function sass handle error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource | 0 |
141,806 | 21,625,568,192 | IssuesEvent | 2022-05-05 01:19:39 | DIT113-V22/group-05 | https://api.github.com/repos/DIT113-V22/group-05 | opened | Navigation Menu | Enhancement App Design | As a user I want to have a clutter free experience while using the app to control the car.
**Acceptance criteria:**
- [ ] A toggle for the navigation menu is visible at the top left of the application
- [ ] Navigation menu has a header with profile picture, name, and e-mail address
- [ ] Core items are visible below the header whilst navigation menu is toggled on
- [ ] Log Out button removes current account and replaces menu items with a register tab | 1.0 | Navigation Menu - As a user I want to have a clutter free experience while using the app to control the car.
**Acceptance criteria:**
- [ ] A toggle for the navigation menu is visible at the top left of the application
- [ ] Navigation menu has a header with profile picture, name, and e-mail address
- [ ] Core items are visible below the header whilst navigation menu is toggled on
- [ ] Log Out button removes current account and replaces menu items with a register tab | non_priority | navigation menu as a user i want to have a clutter free experience while using the app to control the car acceptance criteria a toggle for the navigation menu is visible at the top left of the application navigation menu has a header with profile picture name and e mail address core items are visible below the header whilst navigation menu is toggled on log out button removes current account and replaces menu items with a register tab | 0 |
1,976 | 30,913,728,651 | IssuesEvent | 2023-08-05 02:45:05 | thorvg/thorvg | https://api.github.com/repos/thorvg/thorvg | closed | Windows build error due to strip option | invalid portability | https://github.com/thorvg/thorvg/blob/052cfea4b1251eb016d83586f81111d289748e85/meson.build#L3C127-L3C132
Using the 'strip=true' option causes errors on Windows. If it's not related to size constraints, I believe it's better to remove it. Alternatively, we can consider adding this option only for the Linux platform. What do you think about that approach? | True | Windows build error due to strip option - https://github.com/thorvg/thorvg/blob/052cfea4b1251eb016d83586f81111d289748e85/meson.build#L3C127-L3C132
Using the 'strip=true' option causes errors on Windows. If it's not related to size constraints, I believe it's better to remove it. Alternatively, we can consider adding this option only for the Linux platform. What do you think about that approach? | non_priority | windows build error due to strip option using the strip true option causes errors on windows if it s not related to size constraints i believe it s better to remove it alternatively we can consider adding this option only for the linux platform what do you think about that approach | 0 |
50,503 | 7,607,023,924 | IssuesEvent | 2018-04-30 15:10:43 | golang/go | https://api.github.com/repos/golang/go | closed | Brand Book: Instead of the RGB color code for Pantone 669 C, the Fuchsia code is listed | Documentation | ### What did you do?
I took a look at the Go [Brand Book](https://storage.googleapis.com/golang-assets/go-brand-book-v1.0.pdf) and saw an incorrect color code on page 16.
### What did you expect to see?
Under color [Pantone 669 C](https://www.pantone.com/color-finder/669-C) (under the "More colors" section on page 16), I expected to see the correct RGB color code, which is `63, 42, 86`.
### What did you see instead?
Instead, I saw the RGB code `200, 50, 98` listed underneath, which is the RGB code for Fuchsia.
| 1.0 | Brand Book: Instead of the RGB color code for Pantone 669 C, the Fuchsia code is listed - ### What did you do?
I took a look at the Go [Brand Book](https://storage.googleapis.com/golang-assets/go-brand-book-v1.0.pdf) and saw an incorrect color code on page 16.
### What did you expect to see?
Under color [Pantone 669 C](https://www.pantone.com/color-finder/669-C) (under the "More colors" section on page 16), I expected to see the correct RGB color code, which is `63, 42, 86`.
### What did you see instead?
Instead, I saw the RGB code `200, 50, 98` listed underneath, which is the RGB code for Fuchsia.
| non_priority | brand book instead of the rgb color code for pantone c the fuchsia code is listed what did you do i took a look at the go and saw an incorrect color code on page what did you expect to see under color under the more colors section on page i expected to see the correct rgb color code which is what did you see instead instead i saw the rgb code listed underneath which is the rgb code for fuchsia | 0 |
203,023 | 23,123,442,472 | IssuesEvent | 2022-07-28 01:24:38 | RG4421/grafana | https://api.github.com/repos/RG4421/grafana | closed | CVE-2021-35065 (High) detected in multiple libraries - autoclosed | security vulnerability | ## CVE-2021-35065 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent</p>
<p>
Dependency Hierarchy:
- @grafana/ui-8.1.0-pre.tgz (Root Library)
- addon-essentials-6.2.7.tgz
- addon-docs-6.2.7.tgz
- core-6.2.7.tgz
- core-server-6.2.7.tgz
- core-common-6.2.7.tgz
- glob-base-0.3.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-3.1.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent directory path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent</p>
<p>
Dependency Hierarchy:
- lerna-3.22.1.tgz (Root Library)
- info-3.21.0.tgz
- command-3.21.0.tgz
- project-3.21.0.tgz
- globby-9.2.0.tgz
- fast-glob-2.2.7.tgz
- :x: **glob-parent-3.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-5.1.2.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent</p>
<p>
Dependency Hierarchy:
- eslint-plugin-4.22.0.tgz (Root Library)
- experimental-utils-4.22.0.tgz
- typescript-estree-4.22.0.tgz
- globby-11.0.1.tgz
- fast-glob-3.2.5.tgz
- :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-cj88-88mr-972w">https://github.com/advisories/GHSA-cj88-88mr-972w</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution (glob-parent): 6.0.1</p>
<p>Direct dependency fix Resolution (lerna): 5.1.8</p><p>Fix Resolution (glob-parent): 6.0.1</p>
<p>Direct dependency fix Resolution (@typescript-eslint/eslint-plugin): 5.5.0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | True | CVE-2021-35065 (High) detected in multiple libraries - autoclosed - ## CVE-2021-35065 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent</p>
<p>
Dependency Hierarchy:
- @grafana/ui-8.1.0-pre.tgz (Root Library)
- addon-essentials-6.2.7.tgz
- addon-docs-6.2.7.tgz
- core-6.2.7.tgz
- core-server-6.2.7.tgz
- core-common-6.2.7.tgz
- glob-base-0.3.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-3.1.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent directory path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent</p>
<p>
Dependency Hierarchy:
- lerna-3.22.1.tgz (Root Library)
- info-3.21.0.tgz
- command-3.21.0.tgz
- project-3.21.0.tgz
- globby-9.2.0.tgz
- fast-glob-2.2.7.tgz
- :x: **glob-parent-3.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-5.1.2.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent</p>
<p>
Dependency Hierarchy:
- eslint-plugin-4.22.0.tgz (Root Library)
- experimental-utils-4.22.0.tgz
- typescript-estree-4.22.0.tgz
- globby-11.0.1.tgz
- fast-glob-3.2.5.tgz
- :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-cj88-88mr-972w">https://github.com/advisories/GHSA-cj88-88mr-972w</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution (glob-parent): 6.0.1</p>
<p>Direct dependency fix Resolution (lerna): 5.1.8</p><p>Fix Resolution (glob-parent): 6.0.1</p>
<p>Direct dependency fix Resolution (@typescript-eslint/eslint-plugin): 5.5.0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | non_priority | cve high detected in multiple libraries autoclosed cve high severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file package json path to vulnerable library node modules glob parent dependency hierarchy grafana ui pre tgz root library addon essentials tgz addon docs tgz core tgz core server tgz core common tgz glob base tgz x glob parent tgz vulnerable library glob parent tgz strips glob magic from a string to provide the parent directory path library home page a href path to dependency file package json path to vulnerable library node modules glob parent dependency hierarchy lerna tgz root library info tgz command tgz project tgz globby tgz fast glob tgz x glob parent tgz vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href path to dependency file package json path to vulnerable library node modules glob parent dependency hierarchy eslint plugin tgz root library experimental utils tgz typescript estree tgz globby tgz fast glob tgz x glob parent tgz vulnerable library found in base branch main vulnerability details the package glob parent before are vulnerable to regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent direct dependency fix resolution lerna fix resolution glob parent direct dependency fix resolution typescript eslint eslint plugin rescue worker helmet automatic remediation is available for this issue | 0 |
48,809 | 25,835,861,367 | IssuesEvent | 2022-12-12 19:35:14 | maxbachmann/RapidFuzz | https://api.github.com/repos/maxbachmann/RapidFuzz | closed | Significant performance drop in v2.3.1 as compared to v1.7.0 | performance | Hi @maxbachmann!
There seems to be a 5x drop in performance of `cdist` function using `partial_ratio`.
`v1.7.0`
<img width="738" alt="Screenshot 2022-11-16 at 12 40 12 PM" src="https://user-images.githubusercontent.com/19628452/202110847-d6120118-bf18-4c3a-9251-c5eee9d64fb1.png">
`v2.3.1`
<img width="1017" alt="Screenshot 2022-11-16 at 12 37 19 PM" src="https://user-images.githubusercontent.com/19628452/202111006-a1a30e21-857e-4e50-a78c-2261a5aa619b.png">
Please let me know if there is something that I am missing which might be causing this issue.
Thanks in advance! | True | Significant performance drop in v2.3.1 as compared to v1.7.0 - Hi @maxbachmann!
There seems to be a 5x drop in performance of `cdist` function using `partial_ratio`.
`v1.7.0`
<img width="738" alt="Screenshot 2022-11-16 at 12 40 12 PM" src="https://user-images.githubusercontent.com/19628452/202110847-d6120118-bf18-4c3a-9251-c5eee9d64fb1.png">
`v2.3.1`
<img width="1017" alt="Screenshot 2022-11-16 at 12 37 19 PM" src="https://user-images.githubusercontent.com/19628452/202111006-a1a30e21-857e-4e50-a78c-2261a5aa619b.png">
Please let me know if there is something that I am missing which might be causing this issue.
Thanks in advance! | non_priority | significant performance drop in as compared to hi maxbachmann there seems to be a drop in performance of cdist function using partial ratio img width alt screenshot at pm src img width alt screenshot at pm src please let me know if there is something that i am missing which might be causing this issue thanks in advance | 0 |
269,683 | 23,458,796,146 | IssuesEvent | 2022-08-16 11:19:49 | sparcs-kaist/taxi-back | https://api.github.com/repos/sparcs-kaist/taxi-back | closed | Create testcases for /json/logininfo | authentication 🖥 working testcase | # Summary <!-- 간단한 요약. -->
It implements some testcases for /json/logininfo router, covering both cases where the user is logged in or not.
# Tasks <!-- 해야 할 태스크 체크리스트로 만들기 -->
- [x] Testcase(s) for /json/logininfo
- [x] Testcase(s) for /json/logininfo/detail
| 1.0 | Create testcases for /json/logininfo - # Summary <!-- 간단한 요약. -->
It implements some testcases for /json/logininfo router, covering both cases where the user is logged in or not.
# Tasks <!-- 해야 할 태스크 체크리스트로 만들기 -->
- [x] Testcase(s) for /json/logininfo
- [x] Testcase(s) for /json/logininfo/detail
| non_priority | create testcases for json logininfo summary it implements some testcases for json logininfo router covering both cases where the user is logged in or not tasks testcase s for json logininfo testcase s for json logininfo detail | 0 |
271,902 | 20,720,744,727 | IssuesEvent | 2022-03-13 10:56:21 | gth828r/brownify | https://api.github.com/repos/gth828r/brownify | closed | Add installation instructions and usage instructions | documentation | Add instructions for installing the library and command line program. This will be important once #2 is completed.
We should also use that as an opportunity to update the usage instructions if we can. | 1.0 | Add installation instructions and usage instructions - Add instructions for installing the library and command line program. This will be important once #2 is completed.
We should also use that as an opportunity to update the usage instructions if we can. | non_priority | add installation instructions and usage instructions add instructions for installing the library and command line program this will be important once is completed we should also use that as an opportunity to update the usage instructions if we can | 0 |
144,328 | 11,612,624,156 | IssuesEvent | 2020-02-26 09:18:54 | microsoft/vscode | https://api.github.com/repos/microsoft/vscode | closed | Test Timeline view | testplan-item | Refs: #84297
- [x] anyOS @alexdima
- [x] anyOS @sana-ajani
Complexity: 2
---
## Testing
We are now enabling the _Timeline_ view in the Exporer sidebar by default in insiders and behind the `timeline.showView` setting for stable. For testing, focus only on the Git file history provider. Ensure that paging works, using the _Load me_ item, refresh, and that it appropriate responds to changes to the file and the file's history. | 1.0 | Test Timeline view - Refs: #84297
- [x] anyOS @alexdima
- [x] anyOS @sana-ajani
Complexity: 2
---
## Testing
We are now enabling the _Timeline_ view in the Exporer sidebar by default in insiders and behind the `timeline.showView` setting for stable. For testing, focus only on the Git file history provider. Ensure that paging works, using the _Load me_ item, refresh, and that it appropriate responds to changes to the file and the file's history. | non_priority | test timeline view refs anyos alexdima anyos sana ajani complexity testing we are now enabling the timeline view in the exporer sidebar by default in insiders and behind the timeline showview setting for stable for testing focus only on the git file history provider ensure that paging works using the load me item refresh and that it appropriate responds to changes to the file and the file s history | 0 |
20,086 | 6,818,325,463 | IssuesEvent | 2017-11-07 04:43:41 | Homebrew/homebrew-science | https://api.github.com/repos/Homebrew/homebrew-science | closed | Failed to install fastml with El Capitan | build-error stale upstream | I'm trying to install gubbins but it it keeps failing because fastml won't install. The report can be found in the following location https://github.com/brooksph/gubbins/blob/master/fastml_failed_install
I contacted the developers of gubbins an it was suggested that I install fastml using
brew install https://raw.githubusercontent.com/andrewjpage/homebrew-science/master/fastml.rb
but this did not resolve the issue.
| 1.0 | Failed to install fastml with El Capitan - I'm trying to install gubbins but it it keeps failing because fastml won't install. The report can be found in the following location https://github.com/brooksph/gubbins/blob/master/fastml_failed_install
I contacted the developers of gubbins an it was suggested that I install fastml using
brew install https://raw.githubusercontent.com/andrewjpage/homebrew-science/master/fastml.rb
but this did not resolve the issue.
| non_priority | failed to install fastml with el capitan i m trying to install gubbins but it it keeps failing because fastml won t install the report can be found in the following location i contacted the developers of gubbins an it was suggested that i install fastml using brew install but this did not resolve the issue | 0 |
90,707 | 15,856,252,544 | IssuesEvent | 2021-04-08 01:54:11 | mwilliams7197/zendo | https://api.github.com/repos/mwilliams7197/zendo | opened | CVE-2021-23362 (Medium) detected in hosted-git-info-2.8.8.tgz | security vulnerability | ## CVE-2021-23362 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hosted-git-info-2.8.8.tgz</b></p></summary>
<p>Provides metadata and conversions from repository urls for Github, Bitbucket and Gitlab</p>
<p>Library home page: <a href="https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.8.8.tgz">https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.8.8.tgz</a></p>
<p>Path to dependency file: zendo/package.json</p>
<p>Path to vulnerable library: zendo/node_modules/hosted-git-info/package.json</p>
<p>
Dependency Hierarchy:
- npm-run-all-4.1.5.tgz (Root Library)
- read-pkg-3.0.0.tgz
- normalize-package-data-2.5.0.tgz
- :x: **hosted-git-info-2.8.8.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362>CVE-2021-23362</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/npm/hosted-git-info/releases/tag/v3.0.8">https://github.com/npm/hosted-git-info/releases/tag/v3.0.8</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: hosted-git-info - 3.0.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hosted-git-info","packageVersion":"2.8.8","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"npm-run-all:4.1.5;read-pkg:3.0.0;normalize-package-data:2.5.0;hosted-git-info:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"hosted-git-info - 3.0.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23362","vulnerabilityDetails":"The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-23362 (Medium) detected in hosted-git-info-2.8.8.tgz - ## CVE-2021-23362 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hosted-git-info-2.8.8.tgz</b></p></summary>
<p>Provides metadata and conversions from repository urls for Github, Bitbucket and Gitlab</p>
<p>Library home page: <a href="https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.8.8.tgz">https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.8.8.tgz</a></p>
<p>Path to dependency file: zendo/package.json</p>
<p>Path to vulnerable library: zendo/node_modules/hosted-git-info/package.json</p>
<p>
Dependency Hierarchy:
- npm-run-all-4.1.5.tgz (Root Library)
- read-pkg-3.0.0.tgz
- normalize-package-data-2.5.0.tgz
- :x: **hosted-git-info-2.8.8.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362>CVE-2021-23362</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/npm/hosted-git-info/releases/tag/v3.0.8">https://github.com/npm/hosted-git-info/releases/tag/v3.0.8</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: hosted-git-info - 3.0.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hosted-git-info","packageVersion":"2.8.8","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"npm-run-all:4.1.5;read-pkg:3.0.0;normalize-package-data:2.5.0;hosted-git-info:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"hosted-git-info - 3.0.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23362","vulnerabilityDetails":"The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in hosted git info tgz cve medium severity vulnerability vulnerable library hosted git info tgz provides metadata and conversions from repository urls for github bitbucket and gitlab library home page a href path to dependency file zendo package json path to vulnerable library zendo node modules hosted git info package json dependency hierarchy npm run all tgz root library read pkg tgz normalize package data tgz x hosted git info tgz vulnerable library found in base branch master vulnerability details the package hosted git info before are vulnerable to regular expression denial of service redos via regular expression shortcutmatch in the fromurl function in index js the affected regular expression exhibits polynomial worst case time complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution hosted git info isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree npm run all read pkg normalize package data hosted git info isminimumfixversionavailable true minimumfixversion hosted git info basebranches vulnerabilityidentifier cve vulnerabilitydetails the package hosted git info before are vulnerable to regular expression denial of service redos via regular expression shortcutmatch in the fromurl function in index js the affected regular expression exhibits polynomial worst case time complexity vulnerabilityurl | 0 |
58,170 | 24,361,258,660 | IssuesEvent | 2022-10-03 11:54:57 | reapit/foundations | https://api.github.com/repos/reapit/foundations | closed | Allow Reapit users to retrieve pipelines for all developers | feature front-end added-late deployment-service | **Background context or User story:**
_To support admin #6161 admin users should be able to fetch pipelines by developerId query string_
**Specification or Acceptance Criteria:**
- Logic is `return admin ? devId ? "pipelines with devId" : "all pipelines" : "pipelines with devId from user"`
- Admin defined as member of `ReapitEmployee` group, not restricted to `ReapitEmployeeFoundationsAdmin` | 1.0 | Allow Reapit users to retrieve pipelines for all developers - **Background context or User story:**
_To support admin #6161 admin users should be able to fetch pipelines by developerId query string_
**Specification or Acceptance Criteria:**
- Logic is `return admin ? devId ? "pipelines with devId" : "all pipelines" : "pipelines with devId from user"`
- Admin defined as member of `ReapitEmployee` group, not restricted to `ReapitEmployeeFoundationsAdmin` | non_priority | allow reapit users to retrieve pipelines for all developers background context or user story to support admin admin users should be able to fetch pipelines by developerid query string specification or acceptance criteria logic is return admin devid pipelines with devid all pipelines pipelines with devid from user admin defined as member of reapitemployee group not restricted to reapitemployeefoundationsadmin | 0 |
5,660 | 3,264,713,525 | IssuesEvent | 2015-10-22 13:18:18 | jOOQ/jOOQ | https://api.github.com/repos/jOOQ/jOOQ | opened | Add support for MySQL's SET type | C: Code Generation C: DB: MariaDB C: DB: MySQL T: Enhancement | MySQL knows a useful, vendor-specific `SET` type, which works like `ENUM` but allows for maintaining multiple enum literals within a *set* (without duplicates). We should support this type and map it to `java.util.EnumSet<GeneratedEnum>`.
More information:
- https://dev.mysql.com/doc/refman/5.7/en/set.html
----
See also:
http://stackoverflow.com/q/33277111/521799 | 1.0 | Add support for MySQL's SET type - MySQL knows a useful, vendor-specific `SET` type, which works like `ENUM` but allows for maintaining multiple enum literals within a *set* (without duplicates). We should support this type and map it to `java.util.EnumSet<GeneratedEnum>`.
More information:
- https://dev.mysql.com/doc/refman/5.7/en/set.html
----
See also:
http://stackoverflow.com/q/33277111/521799 | non_priority | add support for mysql s set type mysql knows a useful vendor specific set type which works like enum but allows for maintaining multiple enum literals within a set without duplicates we should support this type and map it to java util enumset more information see also | 0 |
57,930 | 6,561,377,552 | IssuesEvent | 2017-09-07 13:07:15 | imixs/imixs-workflow | https://api.github.com/repos/imixs/imixs-workflow | closed | DocumentService add count methods | enhancement testing | Add the missing implementation of count methods:
- int count(String query)
- int countPages(String query, int pageSize
```
public int countPages(String query, int pageSize) throws QueryException {
double pages = 1;
double count = count(query);
if (count > 0) {
pages = Math.ceil(count / pageSize);
}
return ((int) pages);
}
```
The count method need to ask lucene for the result without loading the data into memory
| 1.0 | DocumentService add count methods - Add the missing implementation of count methods:
- int count(String query)
- int countPages(String query, int pageSize
```
public int countPages(String query, int pageSize) throws QueryException {
double pages = 1;
double count = count(query);
if (count > 0) {
pages = Math.ceil(count / pageSize);
}
return ((int) pages);
}
```
The count method need to ask lucene for the result without loading the data into memory
| non_priority | documentservice add count methods add the missing implementation of count methods int count string query int countpages string query int pagesize public int countpages string query int pagesize throws queryexception double pages double count count query if count pages math ceil count pagesize return int pages the count method need to ask lucene for the result without loading the data into memory | 0 |
116,306 | 9,829,838,356 | IssuesEvent | 2019-06-16 01:51:30 | 11ty/eleventy | https://api.github.com/repos/11ty/eleventy | closed | Markdown not rendering code properly when using a template | needs-test-case | ```
```bash
# Change hostname
echo MY_HOSTNAME > /etc/hostname
hostname MY_HOSTNAME
# Add user
adduser MY_USER # INTERACTIVE
usermod -aG sudo MY_USER
# Disable Xorg
sudo systemctl set-default multi-user.target
# Update
apt update
apt full-upgrade
reboot
\```
```
(no backslash there, just to escape github's formatting)
... is turning into ...
<img width="714" alt="Screen Shot 2019-04-28 at 8 44 20 AM" src="https://user-images.githubusercontent.com/2773700/56866760-2184be00-6992-11e9-91d8-441f4bd39c02.png">
... instead of ...
```bash
# Change hostname
echo MY_HOSTNAME > /etc/hostname
hostname MY_HOSTNAME
# Add user
adduser MY_USER # INTERACTIVE
usermod -aG sudo MY_USER
# Disable Xorg
sudo systemctl set-default multi-user.target
# Update
apt update
apt full-upgrade
reboot
``` | 1.0 | Markdown not rendering code properly when using a template - ```
```bash
# Change hostname
echo MY_HOSTNAME > /etc/hostname
hostname MY_HOSTNAME
# Add user
adduser MY_USER # INTERACTIVE
usermod -aG sudo MY_USER
# Disable Xorg
sudo systemctl set-default multi-user.target
# Update
apt update
apt full-upgrade
reboot
\```
```
(no backslash there, just to escape github's formatting)
... is turning into ...
<img width="714" alt="Screen Shot 2019-04-28 at 8 44 20 AM" src="https://user-images.githubusercontent.com/2773700/56866760-2184be00-6992-11e9-91d8-441f4bd39c02.png">
... instead of ...
```bash
# Change hostname
echo MY_HOSTNAME > /etc/hostname
hostname MY_HOSTNAME
# Add user
adduser MY_USER # INTERACTIVE
usermod -aG sudo MY_USER
# Disable Xorg
sudo systemctl set-default multi-user.target
# Update
apt update
apt full-upgrade
reboot
``` | non_priority | markdown not rendering code properly when using a template bash change hostname echo my hostname etc hostname hostname my hostname add user adduser my user interactive usermod ag sudo my user disable xorg sudo systemctl set default multi user target update apt update apt full upgrade reboot no backslash there just to escape github s formatting is turning into img width alt screen shot at am src instead of bash change hostname echo my hostname etc hostname hostname my hostname add user adduser my user interactive usermod ag sudo my user disable xorg sudo systemctl set default multi user target update apt update apt full upgrade reboot | 0 |
153,087 | 19,702,481,597 | IssuesEvent | 2022-01-12 18:01:18 | Shai-Demo-Org/JS-Demo | https://api.github.com/repos/Shai-Demo-Org/JS-Demo | opened | CVE-2014-10064 (High) detected in qs-0.6.6.tgz | security vulnerability | ## CVE-2014-10064 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>qs-0.6.6.tgz</b></p></summary>
<p>querystring parser</p>
<p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/zaproxy/node_modules/qs/package.json</p>
<p>
Dependency Hierarchy:
- zaproxy-0.2.0.tgz (Root Library)
- request-2.36.0.tgz
- :x: **qs-0.6.6.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Shai-Demo-Org/JS-Demo/commit/3811baa0bbc861a20cc014b2f39a7fd45afb2cdc">3811baa0bbc861a20cc014b2f39a7fd45afb2cdc</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.
<p>Publish Date: 2018-05-31
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-10064>CVE-2014-10064</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-10064">https://nvd.nist.gov/vuln/detail/CVE-2014-10064</a></p>
<p>Release Date: 2018-05-31</p>
<p>Fix Resolution: qs - 1.0.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"0.6.6","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"zaproxy:0.2.0;request:2.36.0;qs:0.6.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"qs - 1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2014-10064","vulnerabilityDetails":"The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-10064","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2014-10064 (High) detected in qs-0.6.6.tgz - ## CVE-2014-10064 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>qs-0.6.6.tgz</b></p></summary>
<p>querystring parser</p>
<p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/zaproxy/node_modules/qs/package.json</p>
<p>
Dependency Hierarchy:
- zaproxy-0.2.0.tgz (Root Library)
- request-2.36.0.tgz
- :x: **qs-0.6.6.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Shai-Demo-Org/JS-Demo/commit/3811baa0bbc861a20cc014b2f39a7fd45afb2cdc">3811baa0bbc861a20cc014b2f39a7fd45afb2cdc</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.
<p>Publish Date: 2018-05-31
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-10064>CVE-2014-10064</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-10064">https://nvd.nist.gov/vuln/detail/CVE-2014-10064</a></p>
<p>Release Date: 2018-05-31</p>
<p>Fix Resolution: qs - 1.0.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"0.6.6","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"zaproxy:0.2.0;request:2.36.0;qs:0.6.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"qs - 1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2014-10064","vulnerabilityDetails":"The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-10064","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in qs tgz cve high severity vulnerability vulnerable library qs tgz querystring parser library home page a href path to dependency file package json path to vulnerable library node modules zaproxy node modules qs package json dependency hierarchy zaproxy tgz root library request tgz x qs tgz vulnerable library found in head commit a href found in base branch main vulnerability details the qs module before does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time an attacker could leverage this to cause a temporary denial of service condition for example in a web application other requests would not be processed while this blocking is occurring publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree zaproxy request qs isminimumfixversionavailable true minimumfixversion qs isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the qs module before does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time an attacker could leverage this to cause a temporary denial of service condition for example in a web application other requests would not be processed while this blocking is occurring vulnerabilityurl | 0 |
14,260 | 3,814,963,084 | IssuesEvent | 2016-03-28 15:52:57 | stevegrunwell/mcavoy | https://api.github.com/repos/stevegrunwell/mcavoy | opened | Images not appearing properly in WordPress.org repository | documentation | For some reason, the banner isn't appearing as it should [in the WordPress.org repo](https://wordpress.org/plugins/mcavoy), nor are the icons appearing when searching through wp-admin.


| 1.0 | Images not appearing properly in WordPress.org repository - For some reason, the banner isn't appearing as it should [in the WordPress.org repo](https://wordpress.org/plugins/mcavoy), nor are the icons appearing when searching through wp-admin.


| non_priority | images not appearing properly in wordpress org repository for some reason the banner isn t appearing as it should nor are the icons appearing when searching through wp admin | 0 |
45,331 | 24,017,798,887 | IssuesEvent | 2022-09-15 03:40:01 | aicers/giganto | https://api.github.com/repos/aicers/giganto | closed | 오래된 레코드 삭제 속도 향상 | performance | 선행 이슈: #40
`storage::retain_periodically`에서는 오래된 레코드(raw event)를 삭제할 때 모든 키값을 읽은 후 시간을 하나씩 비교하는 방법을 쓰고 있습니다. 이 방법은 저장된 레코드 수가 많은 경우 매우 큰 메모리를 필요로 하고, 삭제하는데에 시간도 오래 걸립니다. #40 에서 만든 source 목록을 이용하면 각 source별로 스토리지 내에서 삭제해야 하는 시각의 위치를 바로 찾아갈 수 있으므로 필요한 메모리와 시간을 대폭 줄일 수 있습니다. | True | 오래된 레코드 삭제 속도 향상 - 선행 이슈: #40
`storage::retain_periodically`에서는 오래된 레코드(raw event)를 삭제할 때 모든 키값을 읽은 후 시간을 하나씩 비교하는 방법을 쓰고 있습니다. 이 방법은 저장된 레코드 수가 많은 경우 매우 큰 메모리를 필요로 하고, 삭제하는데에 시간도 오래 걸립니다. #40 에서 만든 source 목록을 이용하면 각 source별로 스토리지 내에서 삭제해야 하는 시각의 위치를 바로 찾아갈 수 있으므로 필요한 메모리와 시간을 대폭 줄일 수 있습니다. | non_priority | 오래된 레코드 삭제 속도 향상 선행 이슈 storage retain periodically 에서는 오래된 레코드 raw event 를 삭제할 때 모든 키값을 읽은 후 시간을 하나씩 비교하는 방법을 쓰고 있습니다 이 방법은 저장된 레코드 수가 많은 경우 매우 큰 메모리를 필요로 하고 삭제하는데에 시간도 오래 걸립니다 에서 만든 source 목록을 이용하면 각 source별로 스토리지 내에서 삭제해야 하는 시각의 위치를 바로 찾아갈 수 있으므로 필요한 메모리와 시간을 대폭 줄일 수 있습니다 | 0 |
224,991 | 17,788,456,369 | IssuesEvent | 2021-08-31 13:47:01 | rpgp/rpgp | https://api.github.com/repos/rpgp/rpgp | closed | Migrate CI to github actions | enhancement testing | Appveyor is just way too slow, and github actions works very well on rustcrypto | 1.0 | Migrate CI to github actions - Appveyor is just way too slow, and github actions works very well on rustcrypto | non_priority | migrate ci to github actions appveyor is just way too slow and github actions works very well on rustcrypto | 0 |
184,716 | 14,289,809,986 | IssuesEvent | 2020-11-23 19:51:48 | github-vet/rangeclosure-findings | https://api.github.com/repos/github-vet/rangeclosure-findings | closed | PDLLab/kytt: api/deps/go/src/runtime/chan_test.go; 31 LoC | fresh small test |
Found a possible issue in [PDLLab/kytt](https://www.github.com/PDLLab/kytt) at [api/deps/go/src/runtime/chan_test.go](https://github.com/PDLLab/kytt/blob/ba969cf016094f7fde29b2079826315662246815/api/deps/go/src/runtime/chan_test.go#L300-L330)
The below snippet of Go code triggered static analysis which searches for goroutines and/or defer statements
which capture loop variables.
[Click here to see the code in its original context.](https://github.com/PDLLab/kytt/blob/ba969cf016094f7fde29b2079826315662246815/api/deps/go/src/runtime/chan_test.go#L300-L330)
<details>
<summary>Click here to show the 31 line(s) of Go which triggered the analyzer.</summary>
```go
for _, chanCap := range []int{0, 10} {
var wg sync.WaitGroup
wg.Add(2)
c := make(chan int, chanCap)
for p := 0; p < 2; p++ {
p := p
go func() {
defer wg.Done()
for i := 0; i < 1000; i++ {
if p == 0 || i%2 == 0 {
select {
case c <- p:
case v := <-c:
if chanCap == 0 && v == p {
t.Fatalf("self receive")
}
}
} else {
select {
case v := <-c:
if chanCap == 0 && v == p {
t.Fatalf("self receive")
}
case c <- p:
}
}
}
}()
}
wg.Wait()
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: ba969cf016094f7fde29b2079826315662246815
| 1.0 | PDLLab/kytt: api/deps/go/src/runtime/chan_test.go; 31 LoC -
Found a possible issue in [PDLLab/kytt](https://www.github.com/PDLLab/kytt) at [api/deps/go/src/runtime/chan_test.go](https://github.com/PDLLab/kytt/blob/ba969cf016094f7fde29b2079826315662246815/api/deps/go/src/runtime/chan_test.go#L300-L330)
The below snippet of Go code triggered static analysis which searches for goroutines and/or defer statements
which capture loop variables.
[Click here to see the code in its original context.](https://github.com/PDLLab/kytt/blob/ba969cf016094f7fde29b2079826315662246815/api/deps/go/src/runtime/chan_test.go#L300-L330)
<details>
<summary>Click here to show the 31 line(s) of Go which triggered the analyzer.</summary>
```go
for _, chanCap := range []int{0, 10} {
var wg sync.WaitGroup
wg.Add(2)
c := make(chan int, chanCap)
for p := 0; p < 2; p++ {
p := p
go func() {
defer wg.Done()
for i := 0; i < 1000; i++ {
if p == 0 || i%2 == 0 {
select {
case c <- p:
case v := <-c:
if chanCap == 0 && v == p {
t.Fatalf("self receive")
}
}
} else {
select {
case v := <-c:
if chanCap == 0 && v == p {
t.Fatalf("self receive")
}
case c <- p:
}
}
}
}()
}
wg.Wait()
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: ba969cf016094f7fde29b2079826315662246815
| non_priority | pdllab kytt api deps go src runtime chan test go loc found a possible issue in at the below snippet of go code triggered static analysis which searches for goroutines and or defer statements which capture loop variables click here to show the line s of go which triggered the analyzer go for chancap range int var wg sync waitgroup wg add c make chan int chancap for p p p p p go func defer wg done for i i i if p i select case c p case v c if chancap v p t fatalf self receive else select case v c if chancap v p t fatalf self receive case c p wg wait leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id | 0 |
31,569 | 7,395,700,734 | IssuesEvent | 2018-03-18 01:40:20 | TFGGestionConferencias/BackendAPI | https://api.github.com/repos/TFGGestionConferencias/BackendAPI | closed | Gestionar conferencias | code medium | Se procederá a realizar los métodos POST, DELETE, PUT y GET correspondientes a conferencia. | 1.0 | Gestionar conferencias - Se procederá a realizar los métodos POST, DELETE, PUT y GET correspondientes a conferencia. | non_priority | gestionar conferencias se procederá a realizar los métodos post delete put y get correspondientes a conferencia | 0 |
39,935 | 5,257,133,444 | IssuesEvent | 2017-02-02 19:47:10 | restrictcontentpro/restrict-content-pro | https://api.github.com/repos/restrictcontentpro/restrict-content-pro | closed | Improve detection of levels with free trials | enhancement has PR needs testing | In #335 we introduced free trials. Detecting a free trial during registration currently relies on some markup changes made in the `register.php` and `register-single.php` templates (data-has-trial attribute).
To improve the experience and help avoid support requests related to this, I think we should pass an array of trial-enabled levels to `rcp_script_options` that we can use instead of relying on the template having the proper data attribute. | 1.0 | Improve detection of levels with free trials - In #335 we introduced free trials. Detecting a free trial during registration currently relies on some markup changes made in the `register.php` and `register-single.php` templates (data-has-trial attribute).
To improve the experience and help avoid support requests related to this, I think we should pass an array of trial-enabled levels to `rcp_script_options` that we can use instead of relying on the template having the proper data attribute. | non_priority | improve detection of levels with free trials in we introduced free trials detecting a free trial during registration currently relies on some markup changes made in the register php and register single php templates data has trial attribute to improve the experience and help avoid support requests related to this i think we should pass an array of trial enabled levels to rcp script options that we can use instead of relying on the template having the proper data attribute | 0 |
12,774 | 4,536,217,795 | IssuesEvent | 2016-09-08 19:44:22 | zhmcclient/python-zhmcclient | https://api.github.com/repos/zhmcclient/python-zhmcclient | opened | JSON objects returned by asynchronous methods are not convenient | area: code | The resource class methods invoking asynchronous HMC operations return the JSON object returned by the HMC if `wait_for_completion=False`. The only information returned in that object is the URI of the Job object.
Proposal: Change the return value to return a new `Job` object that is a resource object filled with just its URI, and that has a method to pull the job status. | 1.0 | JSON objects returned by asynchronous methods are not convenient - The resource class methods invoking asynchronous HMC operations return the JSON object returned by the HMC if `wait_for_completion=False`. The only information returned in that object is the URI of the Job object.
Proposal: Change the return value to return a new `Job` object that is a resource object filled with just its URI, and that has a method to pull the job status. | non_priority | json objects returned by asynchronous methods are not convenient the resource class methods invoking asynchronous hmc operations return the json object returned by the hmc if wait for completion false the only information returned in that object is the uri of the job object proposal change the return value to return a new job object that is a resource object filled with just its uri and that has a method to pull the job status | 0 |
219,063 | 17,049,120,801 | IssuesEvent | 2021-07-06 06:33:39 | aimakerspace/PeekingDuck | https://api.github.com/repos/aimakerspace/PeekingDuck | opened | In test_declarativeloader, windows appends double backslash instead of forward slash in os.path.join | testing | In windows, the os.path.join use double backslash, thus this affect the assertion checks in the unit test that assumed forward slash in the output. (As seen below)
Suggestion:
To do a string replacement before assert statement to change double backslash into 1 forward slash

| 1.0 | In test_declarativeloader, windows appends double backslash instead of forward slash in os.path.join - In windows, the os.path.join use double backslash, thus this affect the assertion checks in the unit test that assumed forward slash in the output. (As seen below)
Suggestion:
To do a string replacement before assert statement to change double backslash into 1 forward slash

| non_priority | in test declarativeloader windows appends double backslash instead of forward slash in os path join in windows the os path join use double backslash thus this affect the assertion checks in the unit test that assumed forward slash in the output as seen below suggestion to do a string replacement before assert statement to change double backslash into forward slash | 0 |
25,512 | 11,185,382,461 | IssuesEvent | 2020-01-01 01:03:51 | TIBCOSoftware/TCSTK-base-app | https://api.github.com/repos/TIBCOSoftware/TCSTK-base-app | opened | CVE-2019-20149 (Medium) detected in multiple libraries | security vulnerability | ## CVE-2019-20149 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>kind-of-3.2.2.tgz</b>, <b>kind-of-4.0.0.tgz</b>, <b>kind-of-6.0.2.tgz</b>, <b>kind-of-5.1.0.tgz</b></p></summary>
<p>
<details><summary><b>kind-of-3.2.2.tgz</b></p></summary>
<p>Get the native type of a value.</p>
<p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz">https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/TCSTK-base-app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/TCSTK-base-app/node_modules/to-object-path/node_modules/kind-of/package.json</p>
<p>
Dependency Hierarchy:
- compiler-cli-8.2.14.tgz (Root Library)
- chokidar-2.1.8.tgz
- braces-2.3.2.tgz
- snapdragon-node-2.1.1.tgz
- snapdragon-util-3.0.1.tgz
- :x: **kind-of-3.2.2.tgz** (Vulnerable Library)
</details>
<details><summary><b>kind-of-4.0.0.tgz</b></p></summary>
<p>Get the native type of a value.</p>
<p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-4.0.0.tgz">https://registry.npmjs.org/kind-of/-/kind-of-4.0.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/TCSTK-base-app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/TCSTK-base-app/node_modules/has-values/node_modules/kind-of/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.20.tgz (Root Library)
- webpack-4.39.2.tgz
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- base-0.11.2.tgz
- cache-base-1.0.1.tgz
- has-value-1.0.0.tgz
- has-values-1.0.0.tgz
- :x: **kind-of-4.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>kind-of-6.0.2.tgz</b></p></summary>
<p>Get the native type of a value.</p>
<p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz">https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/TCSTK-base-app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/TCSTK-base-app/node_modules/kind-of/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.20.tgz (Root Library)
- sass-loader-7.2.0.tgz
- clone-deep-4.0.1.tgz
- :x: **kind-of-6.0.2.tgz** (Vulnerable Library)
</details>
<details><summary><b>kind-of-5.1.0.tgz</b></p></summary>
<p>Get the native type of a value.</p>
<p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-5.1.0.tgz">https://registry.npmjs.org/kind-of/-/kind-of-5.1.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/TCSTK-base-app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/TCSTK-base-app/node_modules/is-descriptor/node_modules/kind-of/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.20.tgz (Root Library)
- webpack-4.39.2.tgz
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- define-property-0.2.5.tgz
- is-descriptor-0.1.6.tgz
- :x: **kind-of-5.1.0.tgz** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
<p>Publish Date: 2019-12-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20149>CVE-2019-20149</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"kind-of","packageVersion":"3.2.2","isTransitiveDependency":true,"dependencyTree":"@angular/compiler-cli:8.2.14;chokidar:2.1.8;braces:2.3.2;snapdragon-node:2.1.1;snapdragon-util:3.0.1;kind-of:3.2.2","isMinimumFixVersionAvailable":false},{"packageType":"javascript/Node.js","packageName":"kind-of","packageVersion":"4.0.0","isTransitiveDependency":true,"dependencyTree":"@angular-devkit/build-angular:0.803.20;webpack:4.39.2;micromatch:3.1.10;snapdragon:0.8.2;base:0.11.2;cache-base:1.0.1;has-value:1.0.0;has-values:1.0.0;kind-of:4.0.0","isMinimumFixVersionAvailable":false},{"packageType":"javascript/Node.js","packageName":"kind-of","packageVersion":"6.0.2","isTransitiveDependency":true,"dependencyTree":"@angular-devkit/build-angular:0.803.20;sass-loader:7.2.0;clone-deep:4.0.1;kind-of:6.0.2","isMinimumFixVersionAvailable":false},{"packageType":"javascript/Node.js","packageName":"kind-of","packageVersion":"5.1.0","isTransitiveDependency":true,"dependencyTree":"@angular-devkit/build-angular:0.803.20;webpack:4.39.2;micromatch:3.1.10;snapdragon:0.8.2;define-property:0.2.5;is-descriptor:0.1.6;kind-of:5.1.0","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2019-20149","vulnerabilityDetails":"ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by \u0027constructor\u0027: {\u0027name\u0027:\u0027Symbol\u0027}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20149","cvss2Severity":"medium","cvss2Score":"5.0","extraData":{}}</REMEDIATE> --> | True | CVE-2019-20149 (Medium) detected in multiple libraries - ## CVE-2019-20149 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>kind-of-3.2.2.tgz</b>, <b>kind-of-4.0.0.tgz</b>, <b>kind-of-6.0.2.tgz</b>, <b>kind-of-5.1.0.tgz</b></p></summary>
<p>
<details><summary><b>kind-of-3.2.2.tgz</b></p></summary>
<p>Get the native type of a value.</p>
<p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz">https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/TCSTK-base-app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/TCSTK-base-app/node_modules/to-object-path/node_modules/kind-of/package.json</p>
<p>
Dependency Hierarchy:
- compiler-cli-8.2.14.tgz (Root Library)
- chokidar-2.1.8.tgz
- braces-2.3.2.tgz
- snapdragon-node-2.1.1.tgz
- snapdragon-util-3.0.1.tgz
- :x: **kind-of-3.2.2.tgz** (Vulnerable Library)
</details>
<details><summary><b>kind-of-4.0.0.tgz</b></p></summary>
<p>Get the native type of a value.</p>
<p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-4.0.0.tgz">https://registry.npmjs.org/kind-of/-/kind-of-4.0.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/TCSTK-base-app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/TCSTK-base-app/node_modules/has-values/node_modules/kind-of/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.20.tgz (Root Library)
- webpack-4.39.2.tgz
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- base-0.11.2.tgz
- cache-base-1.0.1.tgz
- has-value-1.0.0.tgz
- has-values-1.0.0.tgz
- :x: **kind-of-4.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>kind-of-6.0.2.tgz</b></p></summary>
<p>Get the native type of a value.</p>
<p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz">https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/TCSTK-base-app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/TCSTK-base-app/node_modules/kind-of/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.20.tgz (Root Library)
- sass-loader-7.2.0.tgz
- clone-deep-4.0.1.tgz
- :x: **kind-of-6.0.2.tgz** (Vulnerable Library)
</details>
<details><summary><b>kind-of-5.1.0.tgz</b></p></summary>
<p>Get the native type of a value.</p>
<p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-5.1.0.tgz">https://registry.npmjs.org/kind-of/-/kind-of-5.1.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/TCSTK-base-app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/TCSTK-base-app/node_modules/is-descriptor/node_modules/kind-of/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.20.tgz (Root Library)
- webpack-4.39.2.tgz
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- define-property-0.2.5.tgz
- is-descriptor-0.1.6.tgz
- :x: **kind-of-5.1.0.tgz** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
<p>Publish Date: 2019-12-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20149>CVE-2019-20149</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"kind-of","packageVersion":"3.2.2","isTransitiveDependency":true,"dependencyTree":"@angular/compiler-cli:8.2.14;chokidar:2.1.8;braces:2.3.2;snapdragon-node:2.1.1;snapdragon-util:3.0.1;kind-of:3.2.2","isMinimumFixVersionAvailable":false},{"packageType":"javascript/Node.js","packageName":"kind-of","packageVersion":"4.0.0","isTransitiveDependency":true,"dependencyTree":"@angular-devkit/build-angular:0.803.20;webpack:4.39.2;micromatch:3.1.10;snapdragon:0.8.2;base:0.11.2;cache-base:1.0.1;has-value:1.0.0;has-values:1.0.0;kind-of:4.0.0","isMinimumFixVersionAvailable":false},{"packageType":"javascript/Node.js","packageName":"kind-of","packageVersion":"6.0.2","isTransitiveDependency":true,"dependencyTree":"@angular-devkit/build-angular:0.803.20;sass-loader:7.2.0;clone-deep:4.0.1;kind-of:6.0.2","isMinimumFixVersionAvailable":false},{"packageType":"javascript/Node.js","packageName":"kind-of","packageVersion":"5.1.0","isTransitiveDependency":true,"dependencyTree":"@angular-devkit/build-angular:0.803.20;webpack:4.39.2;micromatch:3.1.10;snapdragon:0.8.2;define-property:0.2.5;is-descriptor:0.1.6;kind-of:5.1.0","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2019-20149","vulnerabilityDetails":"ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by \u0027constructor\u0027: {\u0027name\u0027:\u0027Symbol\u0027}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20149","cvss2Severity":"medium","cvss2Score":"5.0","extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries kind of tgz kind of tgz kind of tgz kind of tgz kind of tgz get the native type of a value library home page a href path to dependency file tmp ws scm tcstk base app package json path to vulnerable library tmp ws scm tcstk base app node modules to object path node modules kind of package json dependency hierarchy compiler cli tgz root library chokidar tgz braces tgz snapdragon node tgz snapdragon util tgz x kind of tgz vulnerable library kind of tgz get the native type of a value library home page a href path to dependency file tmp ws scm tcstk base app package json path to vulnerable library tmp ws scm tcstk base app node modules has values node modules kind of package json dependency hierarchy build angular tgz root library webpack tgz micromatch tgz snapdragon tgz base tgz cache base tgz has value tgz has values tgz x kind of tgz vulnerable library kind of tgz get the native type of a value library home page a href path to dependency file tmp ws scm tcstk base app package json path to vulnerable library tmp ws scm tcstk base app node modules kind of package json dependency hierarchy build angular tgz root library sass loader tgz clone deep tgz x kind of tgz vulnerable library kind of tgz get the native type of a value library home page a href path to dependency file tmp ws scm tcstk base app package json path to vulnerable library tmp ws scm tcstk base app node modules is descriptor node modules kind of package json dependency hierarchy build angular tgz root library webpack tgz micromatch tgz snapdragon tgz define property tgz is descriptor tgz x kind of tgz vulnerable library vulnerability details ctorname in index js in kind of allows external user input to overwrite certain internal attributes via a conflicting name as demonstrated by constructor name symbol hence a crafted payload can overwrite this builtin attribute to manipulate the type detection result publish date url a href cvss score details base score metrics not available isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails ctorname in index js in kind of allows external user input to overwrite certain internal attributes via a conflicting name as demonstrated by hence a crafted payload can overwrite this builtin attribute to manipulate the type detection result vulnerabilityurl | 0 |
120,037 | 10,090,734,213 | IssuesEvent | 2019-07-26 12:32:05 | ejohnst2/innervate | https://api.github.com/repos/ejohnst2/innervate | opened | Testing / Test UI components with Jest | testing | 1. User Story (which user story is this related to):
- None
2. Notes (what are helpful notes and breadcrumbs):
- Use jest to test React/Redux component workflows
3. Questions (what questions need to be answered):
-
| 1.0 | Testing / Test UI components with Jest - 1. User Story (which user story is this related to):
- None
2. Notes (what are helpful notes and breadcrumbs):
- Use jest to test React/Redux component workflows
3. Questions (what questions need to be answered):
-
| non_priority | testing test ui components with jest user story which user story is this related to none notes what are helpful notes and breadcrumbs use jest to test react redux component workflows questions what questions need to be answered | 0 |
166,086 | 14,019,386,221 | IssuesEvent | 2020-10-29 18:06:17 | bionomia/bionomia | https://api.github.com/repos/bionomia/bionomia | closed | Create a stripped-down search widget and modify help docs | documentation new feature | - Use https://twitter.github.io/typeahead.js/ or a CDN https://cdnjs.cloudflare.com/ajax/libs/typeahead.js/0.11.1/typeahead.bundle.min.js
- provide template html
- provide sample css
- provide sample js
- add user thumbnail to elasticsearch index
| 1.0 | Create a stripped-down search widget and modify help docs - - Use https://twitter.github.io/typeahead.js/ or a CDN https://cdnjs.cloudflare.com/ajax/libs/typeahead.js/0.11.1/typeahead.bundle.min.js
- provide template html
- provide sample css
- provide sample js
- add user thumbnail to elasticsearch index
| non_priority | create a stripped down search widget and modify help docs use or a cdn provide template html provide sample css provide sample js add user thumbnail to elasticsearch index | 0 |
45,867 | 24,250,081,438 | IssuesEvent | 2022-09-27 13:37:44 | ClickHouse/ClickHouse | https://api.github.com/repos/ClickHouse/ClickHouse | closed | Lower amount of recursion in Parser | performance | We are using hand-written recursive descent parser and it is alright.
But it is using too deep recursion to parse expression with operators.
Something like 10 stack frames to parse any expression element.
We can get rid of the excessive recursion by using "precendence climbing" method or similar:
https://en.wikipedia.org/wiki/Operator-precedence_parser
It is like parsing expression greedy from left to right and binding the operators to arguments according to the priorities.
We have the following operators:
```
a[b]
a.b
-a
+a
NOT a
DATE a
TIMESTAMP a
INTERVAL a UNIT
a IS NULL
a IS NOT NULL
a::Type
a + b
a - b
a * b
a / b
a % b
a DIV b
a MOD b
a || b
a < b
a > b
a <= b
a >= b
a = b
a == b
a != b
a <> b
a AND b
a OR b
a ? b : c
a BETWEEN b AND c
[a, b...]
(a, b...)
f(a, b...)
a -> b
a AS b
a b - only in SELECT expression list
CASE a WHEN b THEN c ... [ELSE d] END
CASE WHEN a THEN b ... [ELSE d] END
```
It is ok if you slightly change some relative priorities of the operators or break some very strange cases.
Example showing too deep recursion:
```
clickhouse-local --max_parser_depth 100000 --query "SELECT f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f())))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))"
Aborted (core dumped)
```
Less than 1000 levels of nesting are exhausting 2 MiB stack. | True | Lower amount of recursion in Parser - We are using hand-written recursive descent parser and it is alright.
But it is using too deep recursion to parse expression with operators.
Something like 10 stack frames to parse any expression element.
We can get rid of the excessive recursion by using "precendence climbing" method or similar:
https://en.wikipedia.org/wiki/Operator-precedence_parser
It is like parsing expression greedy from left to right and binding the operators to arguments according to the priorities.
We have the following operators:
```
a[b]
a.b
-a
+a
NOT a
DATE a
TIMESTAMP a
INTERVAL a UNIT
a IS NULL
a IS NOT NULL
a::Type
a + b
a - b
a * b
a / b
a % b
a DIV b
a MOD b
a || b
a < b
a > b
a <= b
a >= b
a = b
a == b
a != b
a <> b
a AND b
a OR b
a ? b : c
a BETWEEN b AND c
[a, b...]
(a, b...)
f(a, b...)
a -> b
a AS b
a b - only in SELECT expression list
CASE a WHEN b THEN c ... [ELSE d] END
CASE WHEN a THEN b ... [ELSE d] END
```
It is ok if you slightly change some relative priorities of the operators or break some very strange cases.
Example showing too deep recursion:
```
clickhouse-local --max_parser_depth 100000 --query "SELECT f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f(f())))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))"
Aborted (core dumped)
```
Less than 1000 levels of nesting are exhausting 2 MiB stack. | non_priority | lower amount of recursion in parser we are using hand written recursive descent parser and it is alright but it is using too deep recursion to parse expression with operators something like stack frames to parse any expression element we can get rid of the excessive recursion by using precendence climbing method or similar it is like parsing expression greedy from left to right and binding the operators to arguments according to the priorities we have the following operators a a b a a not a date a timestamp a interval a unit a is null a is not null a type a b a b a b a b a b a div b a mod b a b a b a b a b a b a b a b a b a b a and b a or b a b c a between b and c a b f a b a b a as b a b only in select expression list case a when b then c end case when a then b end it is ok if you slightly change some relative priorities of the operators or break some very strange cases example showing too deep recursion clickhouse local max parser depth query select f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f f aborted core dumped less than levels of nesting are exhausting mib stack | 0 |
84,360 | 24,284,173,993 | IssuesEvent | 2022-09-28 20:17:05 | dotnet/arcade | https://api.github.com/repos/dotnet/arcade | closed | Build failed: arcade-services-internal-ci/main #20220926.1 | Build Failed | Build [#20220926.1](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_build/results?buildId=2003828) failed
## :x: : internal / arcade-services-internal-ci failed
### Summary
**Finished** - Mon, 26 Sep 2022 12:23:53 GMT
**Duration** - 142 minutes
**Requested for** - DotNet Bot
**Reason** - batchedCI
### Details
#### Validate deployment
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/298) - Test Run Failed.
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/298) - Vstest failed with error. Check logs for failures. There might be failed tests.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/298) - Error: The process 'D:\a\_work\_tasks\VSTest_ef087383-ee5e-42c7-9a53-ab56c98420f9\2.205.0\Modules\DTAExecutionHost.exe' failed with exit code 1
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/298) - Vstest failed with error. Check logs for failures. There might be failed tests.
#### Deploy
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/223) - Error: Failed to update deployment history. Error: Conflict (CODE: 409)
#### Build
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/29) - Could not parse Jtokens from file D:\a\_work\1\s\src\Maestro\maestro-angular\node_modules\resolve\test\resolver\malformed_package_json\package.json.
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/52) - Could not parse Jtokens from file D:\a\_work\1\s\src\Maestro\maestro-angular\node_modules\resolve\test\resolver\malformed_package_json\package.json.
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/61) - Could not parse Jtokens from file D:\a\_work\1\s\src\Maestro\maestro-angular\node_modules\resolve\test\resolver\malformed_package_json\package.json.
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/64) - Could not parse Jtokens from file D:\a\_work\1\s\src\Maestro\maestro-angular\node_modules\resolve\test\resolver\malformed_package_json\package.json.
### Changes
- [60474d4d](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_git/ec29e881-6ad7-4427-832d-ce639ccba518/commit/60474d4da6da4ad95609fd1fd2d55b56fca4ee5e) - Přemek Vysoký - Split `IGitRepo`, `ILocalGitRepo`, enable listing git submodules (#2022)
| 1.0 | Build failed: arcade-services-internal-ci/main #20220926.1 - Build [#20220926.1](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_build/results?buildId=2003828) failed
## :x: : internal / arcade-services-internal-ci failed
### Summary
**Finished** - Mon, 26 Sep 2022 12:23:53 GMT
**Duration** - 142 minutes
**Requested for** - DotNet Bot
**Reason** - batchedCI
### Details
#### Validate deployment
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/298) - Test Run Failed.
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/298) - Vstest failed with error. Check logs for failures. There might be failed tests.
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/298) - Error: The process 'D:\a\_work\_tasks\VSTest_ef087383-ee5e-42c7-9a53-ab56c98420f9\2.205.0\Modules\DTAExecutionHost.exe' failed with exit code 1
- :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/298) - Vstest failed with error. Check logs for failures. There might be failed tests.
#### Deploy
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/223) - Error: Failed to update deployment history. Error: Conflict (CODE: 409)
#### Build
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/29) - Could not parse Jtokens from file D:\a\_work\1\s\src\Maestro\maestro-angular\node_modules\resolve\test\resolver\malformed_package_json\package.json.
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/52) - Could not parse Jtokens from file D:\a\_work\1\s\src\Maestro\maestro-angular\node_modules\resolve\test\resolver\malformed_package_json\package.json.
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/61) - Could not parse Jtokens from file D:\a\_work\1\s\src\Maestro\maestro-angular\node_modules\resolve\test\resolver\malformed_package_json\package.json.
- :warning: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2003828/logs/64) - Could not parse Jtokens from file D:\a\_work\1\s\src\Maestro\maestro-angular\node_modules\resolve\test\resolver\malformed_package_json\package.json.
### Changes
- [60474d4d](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_git/ec29e881-6ad7-4427-832d-ce639ccba518/commit/60474d4da6da4ad95609fd1fd2d55b56fca4ee5e) - Přemek Vysoký - Split `IGitRepo`, `ILocalGitRepo`, enable listing git submodules (#2022)
| non_priority | build failed arcade services internal ci main build failed x internal arcade services internal ci failed summary finished mon sep gmt duration minutes requested for dotnet bot reason batchedci details validate deployment x test run failed warning vstest failed with error check logs for failures there might be failed tests x error the process d a work tasks vstest modules dtaexecutionhost exe failed with exit code x vstest failed with error check logs for failures there might be failed tests deploy warning error failed to update deployment history error conflict code build warning could not parse jtokens from file d a work s src maestro maestro angular node modules resolve test resolver malformed package json package json warning could not parse jtokens from file d a work s src maestro maestro angular node modules resolve test resolver malformed package json package json warning could not parse jtokens from file d a work s src maestro maestro angular node modules resolve test resolver malformed package json package json warning could not parse jtokens from file d a work s src maestro maestro angular node modules resolve test resolver malformed package json package json changes přemek vysoký split igitrepo ilocalgitrepo enable listing git submodules | 0 |
154,586 | 24,323,185,427 | IssuesEvent | 2022-09-30 12:40:56 | kodadot/nft-gallery | https://api.github.com/repos/kodadot/nft-gallery | closed | Redesign: Carousel | chief redesign | parent task: https://github.com/kodadot/nft-gallery/issues/3844
- [x] #3947
- [x] Redesign: Carousel - Responsive
- [x] Redesign: Carousel - Dark Mode
- [ ] Redesign: Carousel - Add collection name
- [ ] https://github.com/kodadot/nft-gallery/issues/3928
- [x] Redesign: Carousel - Hover and Press Interaction
- [x] Redesign: Carousel - Support scroll wheel | 1.0 | Redesign: Carousel - parent task: https://github.com/kodadot/nft-gallery/issues/3844
- [x] #3947
- [x] Redesign: Carousel - Responsive
- [x] Redesign: Carousel - Dark Mode
- [ ] Redesign: Carousel - Add collection name
- [ ] https://github.com/kodadot/nft-gallery/issues/3928
- [x] Redesign: Carousel - Hover and Press Interaction
- [x] Redesign: Carousel - Support scroll wheel | non_priority | redesign carousel parent task redesign carousel responsive redesign carousel dark mode redesign carousel add collection name redesign carousel hover and press interaction redesign carousel support scroll wheel | 0 |
45,622 | 5,722,774,325 | IssuesEvent | 2017-04-20 10:20:20 | I2PC/scipion | https://api.github.com/repos/I2PC/scipion | closed | Invisible protocols | betatesting enhancement gui | New protocols usually are not added to the protocol tree, therefore do not appear unless doing Ctrl+F. Implement a self discovery function or review the protocol template.
| 1.0 | Invisible protocols - New protocols usually are not added to the protocol tree, therefore do not appear unless doing Ctrl+F. Implement a self discovery function or review the protocol template.
| non_priority | invisible protocols new protocols usually are not added to the protocol tree therefore do not appear unless doing ctrl f implement a self discovery function or review the protocol template | 0 |
299,272 | 25,892,545,306 | IssuesEvent | 2022-12-14 19:14:37 | rancher/rancher | https://api.github.com/repos/rancher/rancher | closed | Add Docker 20.10.18, 20.10.19, 20.10.20 and 20.10.21 | kind/enhancement [zube]: To Test feature/rancher-docker-install team/area2 team/infracloud | Upstream has released the following:
https://github.com/moby/moby/releases/tag/v20.10.18
https://github.com/moby/moby/releases/tag/v20.10.19
https://github.com/moby/moby/releases/tag/v20.10.20
https://github.com/moby/moby/releases/tag/v20.10.21
The same approach for implementation and testing as https://github.com/rancher/rancher/issues/38390 | 1.0 | Add Docker 20.10.18, 20.10.19, 20.10.20 and 20.10.21 - Upstream has released the following:
https://github.com/moby/moby/releases/tag/v20.10.18
https://github.com/moby/moby/releases/tag/v20.10.19
https://github.com/moby/moby/releases/tag/v20.10.20
https://github.com/moby/moby/releases/tag/v20.10.21
The same approach for implementation and testing as https://github.com/rancher/rancher/issues/38390 | non_priority | add docker and upstream has released the following the same approach for implementation and testing as | 0 |
139,594 | 18,853,672,972 | IssuesEvent | 2021-11-12 01:29:10 | jiw065/Springboot-demo | https://api.github.com/repos/jiw065/Springboot-demo | opened | CVE-2020-9548 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2020-9548 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /Springboot-demo/spring-boot-demo/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.5.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.5.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548>CVE-2020-9548</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.6,2.9.10.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-9548 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2020-9548 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /Springboot-demo/spring-boot-demo/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.5.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.5.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548>CVE-2020-9548</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.6,2.9.10.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file springboot demo spring boot demo pom xml path to vulnerable library root repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to br com anteros dbcp anterosdbcpconfig aka anteros core publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
54,538 | 13,386,477,979 | IssuesEvent | 2020-09-02 14:46:55 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | opened | build: add TeamCity build configuration for publishing the `latest` release artifacts to S3 | A-build-system C-enhancement | Sometimes we want more control over publishing a release's artifacts as `latest` in S3.
- Build configuration name: Publish Latest Cockroach S3 Artifacts
- Parameters:
- Version Name: the name of the release whose release artifacts should be published as `latest` in S3 (ex: v20.1.5). Pre-release versions should cause an error.
| 1.0 | build: add TeamCity build configuration for publishing the `latest` release artifacts to S3 - Sometimes we want more control over publishing a release's artifacts as `latest` in S3.
- Build configuration name: Publish Latest Cockroach S3 Artifacts
- Parameters:
- Version Name: the name of the release whose release artifacts should be published as `latest` in S3 (ex: v20.1.5). Pre-release versions should cause an error.
| non_priority | build add teamcity build configuration for publishing the latest release artifacts to sometimes we want more control over publishing a release s artifacts as latest in build configuration name publish latest cockroach artifacts parameters version name the name of the release whose release artifacts should be published as latest in ex pre release versions should cause an error | 0 |
258,269 | 27,563,882,963 | IssuesEvent | 2023-03-08 01:13:18 | jtimberlake/pacbot | https://api.github.com/repos/jtimberlake/pacbot | opened | CVE-2022-24785 (High) detected in moment-2.24.0.tgz | security vulnerability | ## CVE-2022-24785 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-2.24.0.tgz</b></p></summary>
<p>Parse, validate, manipulate, and display dates</p>
<p>Library home page: <a href="https://registry.npmjs.org/moment/-/moment-2.24.0.tgz">https://registry.npmjs.org/moment/-/moment-2.24.0.tgz</a></p>
<p>Path to dependency file: /webapp/package.json</p>
<p>Path to vulnerable library: /webapp/node_modules/moment/package.json</p>
<p>
Dependency Hierarchy:
- :x: **moment-2.24.0.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
<p>Publish Date: 2022-04-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-24785>CVE-2022-24785</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4">https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4</a></p>
<p>Release Date: 2022-04-04</p>
<p>Fix Resolution: 2.29.2</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | True | CVE-2022-24785 (High) detected in moment-2.24.0.tgz - ## CVE-2022-24785 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-2.24.0.tgz</b></p></summary>
<p>Parse, validate, manipulate, and display dates</p>
<p>Library home page: <a href="https://registry.npmjs.org/moment/-/moment-2.24.0.tgz">https://registry.npmjs.org/moment/-/moment-2.24.0.tgz</a></p>
<p>Path to dependency file: /webapp/package.json</p>
<p>Path to vulnerable library: /webapp/node_modules/moment/package.json</p>
<p>
Dependency Hierarchy:
- :x: **moment-2.24.0.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
<p>Publish Date: 2022-04-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-24785>CVE-2022-24785</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4">https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4</a></p>
<p>Release Date: 2022-04-04</p>
<p>Fix Resolution: 2.29.2</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | non_priority | cve high detected in moment tgz cve high severity vulnerability vulnerable library moment tgz parse validate manipulate and display dates library home page a href path to dependency file webapp package json path to vulnerable library webapp node modules moment package json dependency hierarchy x moment tgz vulnerable library found in base branch master vulnerability details moment js is a javascript date library for parsing validating manipulating and formatting dates a path traversal vulnerability impacts npm server users of moment js between versions and especially if a user provided locale string is directly used to switch moment locale this problem is patched in and the patch can be applied to all affected versions as a workaround sanitize the user provided locale name before passing it to moment js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue | 0 |
398,510 | 27,199,144,617 | IssuesEvent | 2023-02-20 08:25:25 | BlazorComponent/MASA.Blazor | https://api.github.com/repos/BlazorComponent/MASA.Blazor | closed | 能否把每次新添加的内容标注出来? | type/documentation | 这次看6.x的文档发现左侧导航栏标记了一些组件是预置还是JS代理,但是有一个问题,很难发现哪些组件或者能力是新增的,在以后的版本里能否添加一个[新增]的Tag标记一下。 | 1.0 | 能否把每次新添加的内容标注出来? - 这次看6.x的文档发现左侧导航栏标记了一些组件是预置还是JS代理,但是有一个问题,很难发现哪些组件或者能力是新增的,在以后的版本里能否添加一个[新增]的Tag标记一下。 | non_priority | 能否把每次新添加的内容标注出来 x的文档发现左侧导航栏标记了一些组件是预置还是js代理,但是有一个问题,很难发现哪些组件或者能力是新增的,在以后的版本里能否添加一个 的tag标记一下。 | 0 |
247,283 | 20,970,424,455 | IssuesEvent | 2022-03-28 10:49:55 | ENG1-C1T2/York-Pirates-2 | https://api.github.com/repos/ENG1-C1T2/York-Pirates-2 | opened | Game Package Tests | assessment 2 testing | Tests need to be completed for each module in the Game package.
- [ ] AI
- [ ] Components
- [ ] Entitys
- [ ] Managers
- [ ] Physics
- [ ] Quests
- [ ] UI
- [ ] Faction Class
- [ ] PirateGame class | 1.0 | Game Package Tests - Tests need to be completed for each module in the Game package.
- [ ] AI
- [ ] Components
- [ ] Entitys
- [ ] Managers
- [ ] Physics
- [ ] Quests
- [ ] UI
- [ ] Faction Class
- [ ] PirateGame class | non_priority | game package tests tests need to be completed for each module in the game package ai components entitys managers physics quests ui faction class pirategame class | 0 |
103,491 | 11,357,907,464 | IssuesEvent | 2020-01-25 09:56:58 | hill-a/stable-baselines | https://api.github.com/repos/hill-a/stable-baselines | closed | docs for 2.9.0 have not been released | documentation | Hi the version in pip is 2.9.0 however read the docs does not contain this build:

| 1.0 | docs for 2.9.0 have not been released - Hi the version in pip is 2.9.0 however read the docs does not contain this build:

| non_priority | docs for have not been released hi the version in pip is however read the docs does not contain this build | 0 |
70,863 | 13,541,328,118 | IssuesEvent | 2020-09-16 15:44:32 | jupyterlab/jupyterlab | https://api.github.com/repos/jupyterlab/jupyterlab | closed | webpack to-string-loader used in codemirror | pkg:codemirror | Historically, we have not used webpack-specific loaders in our codebase. Also, we now avoid explicitly including css files in our typescript code.
However, #8584 introduced these two lines in codemirror that now require that we have the webpack `to-string-loader` available when we use the codemirror module.
https://github.com/jupyterlab/jupyterlab/blob/b8a145acd9ad599d5505384b4c2a39495cb9850c/packages/codemirror/src/editor.ts#L58-L61
We should examine this carefully to make sure this is how we want to load this css for the shadow dom.
For now, this breaks some of our independent examples, but they coincidentally pass tests because they are compiled in the main jupyterlab tree. A separate issue should be opened about testing the examples completely independent of the jupyterlab codebase. | 1.0 | webpack to-string-loader used in codemirror - Historically, we have not used webpack-specific loaders in our codebase. Also, we now avoid explicitly including css files in our typescript code.
However, #8584 introduced these two lines in codemirror that now require that we have the webpack `to-string-loader` available when we use the codemirror module.
https://github.com/jupyterlab/jupyterlab/blob/b8a145acd9ad599d5505384b4c2a39495cb9850c/packages/codemirror/src/editor.ts#L58-L61
We should examine this carefully to make sure this is how we want to load this css for the shadow dom.
For now, this breaks some of our independent examples, but they coincidentally pass tests because they are compiled in the main jupyterlab tree. A separate issue should be opened about testing the examples completely independent of the jupyterlab codebase. | non_priority | webpack to string loader used in codemirror historically we have not used webpack specific loaders in our codebase also we now avoid explicitly including css files in our typescript code however introduced these two lines in codemirror that now require that we have the webpack to string loader available when we use the codemirror module we should examine this carefully to make sure this is how we want to load this css for the shadow dom for now this breaks some of our independent examples but they coincidentally pass tests because they are compiled in the main jupyterlab tree a separate issue should be opened about testing the examples completely independent of the jupyterlab codebase | 0 |
203,948 | 15,891,196,287 | IssuesEvent | 2021-04-10 18:16:47 | purnima143/Kurakoo | https://api.github.com/repos/purnima143/Kurakoo | closed | Need to update readme file | documentation gssoc21 level1 | Need to add how to set up a backend to a local machine in the readme file, @purnima143 assign it to me. | 1.0 | Need to update readme file - Need to add how to set up a backend to a local machine in the readme file, @purnima143 assign it to me. | non_priority | need to update readme file need to add how to set up a backend to a local machine in the readme file assign it to me | 0 |
68,016 | 9,114,802,757 | IssuesEvent | 2019-02-22 01:54:09 | aws-amplify/docs | https://api.github.com/repos/aws-amplify/docs | opened | Change case for exact match quote | documentation site | **Describe the bug**
Go to https://aws-amplify.github.io/docs/ios/authentication#google-with-cognito-identity
Look for words : "start integrating"
On the Google portal, the section name is "Start Integrating".
We should change the words in our docs to match "Start Integrating" as we reference exact quote match.
| 1.0 | Change case for exact match quote - **Describe the bug**
Go to https://aws-amplify.github.io/docs/ios/authentication#google-with-cognito-identity
Look for words : "start integrating"
On the Google portal, the section name is "Start Integrating".
We should change the words in our docs to match "Start Integrating" as we reference exact quote match.
| non_priority | change case for exact match quote describe the bug go to look for words start integrating on the google portal the section name is start integrating we should change the words in our docs to match start integrating as we reference exact quote match | 0 |
51,194 | 26,959,568,724 | IssuesEvent | 2023-02-08 17:08:51 | Princeton-CDH/geniza | https://api.github.com/repos/Princeton-CDH/geniza | opened | Make the rotation degree (top of image in the transcription editor) clickable and editable so you can enter the degree of rotation you want in addition to manually moving the circle | 🆕 enhancement performant | **Is your feature request related to a problem? Please describe.**
While there are some non-standard document rotations necessary (diagonal margin-writing in letters, for example), much of the rotation we need to do for Geniza documents is in 90 degree-increments (address written upside down on the verso, margin-writing 90 degrees to the main text, etc). We can currently move the rotation circle, but it takes time to get a precise rotation of 90, 180, etc.
**Describe the solution you'd like**
We would like the rotation degree next to the rotation circle to be clickable and editable so you can enter the degree of rotation desired and have the image rotate as needed. This would be in addition to the current rotation functionality (of being able to manually rotate).
**Additional context**
Talking about this thing here (mostly for my own recall, I'm super visual)

| True | Make the rotation degree (top of image in the transcription editor) clickable and editable so you can enter the degree of rotation you want in addition to manually moving the circle - **Is your feature request related to a problem? Please describe.**
While there are some non-standard document rotations necessary (diagonal margin-writing in letters, for example), much of the rotation we need to do for Geniza documents is in 90 degree-increments (address written upside down on the verso, margin-writing 90 degrees to the main text, etc). We can currently move the rotation circle, but it takes time to get a precise rotation of 90, 180, etc.
**Describe the solution you'd like**
We would like the rotation degree next to the rotation circle to be clickable and editable so you can enter the degree of rotation desired and have the image rotate as needed. This would be in addition to the current rotation functionality (of being able to manually rotate).
**Additional context**
Talking about this thing here (mostly for my own recall, I'm super visual)

| non_priority | make the rotation degree top of image in the transcription editor clickable and editable so you can enter the degree of rotation you want in addition to manually moving the circle is your feature request related to a problem please describe while there are some non standard document rotations necessary diagonal margin writing in letters for example much of the rotation we need to do for geniza documents is in degree increments address written upside down on the verso margin writing degrees to the main text etc we can currently move the rotation circle but it takes time to get a precise rotation of etc describe the solution you d like we would like the rotation degree next to the rotation circle to be clickable and editable so you can enter the degree of rotation desired and have the image rotate as needed this would be in addition to the current rotation functionality of being able to manually rotate additional context talking about this thing here mostly for my own recall i m super visual | 0 |
48,289 | 25,471,249,537 | IssuesEvent | 2022-11-25 10:21:43 | frappe/frappe | https://api.github.com/repos/frappe/frappe | opened | Add jitter on scheduled jobs | feature-request performance | hourly, daily long processes if all started at once can cause sudden increase in workload if you have many sites/benches.
Adding simple jitter to scheduled time can lessen the impact of such issues. Jitter is common pattern used for solving problems with "frequency" becomes a problem. E.g. gunicorn adds jitter to avoid restarting all workers at same time, profilers add jitter to avoid amplifying some pattern of repeated work. retry/backoff implementations also use to avoid creating patterns.
Possible implementation: When importing scheduled job types add some random delays in cron. E.g. daily jobs will start in the range of 12:00-12:15 AM instead of all starting at 12:00 AM.
Cons: Some jobs are required to be executed at specific times e.g. birthday reminders. So adding negative offset can introduce bugs for them, positive jitter however should be fine AFAIK. | True | Add jitter on scheduled jobs - hourly, daily long processes if all started at once can cause sudden increase in workload if you have many sites/benches.
Adding simple jitter to scheduled time can lessen the impact of such issues. Jitter is common pattern used for solving problems with "frequency" becomes a problem. E.g. gunicorn adds jitter to avoid restarting all workers at same time, profilers add jitter to avoid amplifying some pattern of repeated work. retry/backoff implementations also use to avoid creating patterns.
Possible implementation: When importing scheduled job types add some random delays in cron. E.g. daily jobs will start in the range of 12:00-12:15 AM instead of all starting at 12:00 AM.
Cons: Some jobs are required to be executed at specific times e.g. birthday reminders. So adding negative offset can introduce bugs for them, positive jitter however should be fine AFAIK. | non_priority | add jitter on scheduled jobs hourly daily long processes if all started at once can cause sudden increase in workload if you have many sites benches adding simple jitter to scheduled time can lessen the impact of such issues jitter is common pattern used for solving problems with frequency becomes a problem e g gunicorn adds jitter to avoid restarting all workers at same time profilers add jitter to avoid amplifying some pattern of repeated work retry backoff implementations also use to avoid creating patterns possible implementation when importing scheduled job types add some random delays in cron e g daily jobs will start in the range of am instead of all starting at am cons some jobs are required to be executed at specific times e g birthday reminders so adding negative offset can introduce bugs for them positive jitter however should be fine afaik | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.